Before you can start scanning storage resources and generating reports, you first need to perform some setup procedures.
Section 4.1, Enabling Other Identity Systems
Section 4.2, Viewing Storage Resources
Section 4.3, Assigning Proxy Targets
Section 4.4, Configuring Notifications
Section 4.5, Integrating with File Dynamics or Storage Manager