

Change Orders › Change Management › Configuration Audit and Control Facility › How to Define Policies for Change Verification › Example: Manage Changes from an Unauthorized MDR
Example: Manage Changes from an Unauthorized MDR
In this example, the Configuration Administrator established a verification policy to manage changes from an unauthorized MDR named MDR1. The policy rejects all updates to CIs from MDR1.
The following steps describe the lifecycle of this verification policy:
- You create a Verification Policy with an MDR Name pattern of MDR1 and an Update Behavior of Always Cancel Entire Transaction.
- Enable all Change Order alignment options.
- Specify Any Managed Attribute and an asterisk (*) for all filters.
- When the discovery tool (MDR1) runs and exports the data to the CMDB, the verification policy rejects all the updates.