Protection of Sensitive Message Data
Use
This section explains how to configure the PI landscape to hide sensitive message data. Message data can be obtained by the following messaging components, either by using PI monitoring tools or by writing the data to trace files: