Shahbaz,
For a new implementation of CAPAM, please check in the CAPAM 3.2 documentation at the following areas, but you should read as much as possible of the Deploying and Implementation process from beginning to end:
Deploying - CA Privileged Access Manager - 3.2 - CA Technologies Documentation
Implementing - CA Privileged Access Manager - 3.2 - CA Technologies Documentation
For policies, there are a few different types, view here for a list and description. The Access policy is the most important in setting up CAPAM first, because the Access policy is what connects a user/group to a target device (server). The other policies are once the users and devices are setup, you can configure recording, password and Access restriction policies.
- Access types (access method applets, TCP/UDP and application services)
- Access restrictions (command filters, socket filters)
- Passwords (which involve Devices and resident applications)
- Recording (graphical or command line)
Provision Access Policies - CA Privileged Access Manager - 3.2 - CA Technologies Documentation
I hope this helps.
Anthony