Configure resources and monitoring
You can configure ARM to scan the access rights structures in specific intervals from different resource systems in your network.
The scan results are stored in an SQL database. Using the ARM Configuration application, you can access the results to troubleshoot and resolve access issues in your organization. Events that occur between scans are captured by the Logga (monitoring) features.
In the ARM Configuration application, click Scans to configure the resources and monitoring (Logga) settings.
See the following sections for details about scanning specific resources in your organization: