Before You Begin
Polycom, Inc. xix
How admin can be informed of any security anomalies (including data breach)
Address book All of the following:
• Name
• Endpoint website
• IP Address (H.323 and
SIP)
• Alias Name/Type (H.323
Only)
• SIP Address
• Endpoint Website IP
Address (IP Only)
• Ease of use for dialing
participant
• Store frequently used
information
• RMX Manager
• RealPresence Resource
Manager (if configured)
Audit and log
files
• Admin and User
credentials (excluding
passwords)
• All CDR details
• Admin and User actions
• Admin and user activity
logging
• Maintain history of
configuration changes
• Troubleshooting system
issues
• RMX Manager
• RealPresence Resource
Manager (if configured)
• Download to USB
• API
APIs are used to retrieve
audit and log files. Use
TRANS_AUDIT_FILE_SU
MMARY_LIST API for
audit files and
TRANS_LOG_FILE_LIST
for log files.
All RMX APIs are available
at Polycom Support page.
See the RMX API SDK for
your version of the
product.S
Security
anomaly
type
Where to check Recommended frequency to check
All active
alarms
See the Active Alarms , Hardware
Monitoring and System Flags sections in
this guide.
The alarms are checked every 3 sec. If there is new
alarm, the alarm list is updated with new list of alarms.
Recommend log review once daily
Personal
Data
Category Type of Personal Data Purpose of Processing Interface type