Show TOC

Background documentationProtection of Sensitive Message Data Locate this document in the navigation structure

 

This section explains how to configure the PI landscape to hide sensitive message data. Message data can be obtained by the following messaging components, either by using PI monitoring tools or by writing the data to trace files: