A typical PowerDesigner environment comprises a number of networked
components that an administrator is responsible for securing through appropriate encryption
and authentication policies.
Administrators should consider the following when planning to secure your
PowerDesigner environment:
The following forms of monitoring are available:
- The list of repository activities (see Auditing Repository Activities).
- The repository proxy log file (see Installation Guide
> Installing the Repository Proxy).
- If you are experiencing problems with memory usage or repository database
performance, contact customer support to obtain access to further debugging
features.