Hi Enrique,
To clarify where the new functionality of "Inbound Sync Configurations" reside, I created exports of the J2EE tier and the IMPD DSAs.
I then executed the changes with the new IM User Console/Settings/Provisioning Configurations/Inbound Notification Configuration
Configure Inbound Notifications - CA Identity Manager - 14.1 - CA Technologies Documentation

I was able to discover that these settings are stored on the IMPD CO DSA.
- These settings are stored as an XML package in the attribute: eTConfigPayload
- Under the IME configuration for the IMPS tier.
eTConfigName=BLS Connectivity Configuration,eTConfigContainerName=Configur
ation,eTNamespaceName=CommonObjects,dc=im,dc=etadb
The BLS Connectivity setting is aka IMPS "Identity Manager Setup" Setting.
- However, the eTConfigPayload attribute is NOT fully viewable of all attributes, as set from the IM User Console.

Using an LDIFDELTA of before/after, I am able to view the base64 of this attribute: eTConfigPayload

Using the LINUX command, base64, we can store & then view this attribute:
[dsa@vapp0001 ~/backup]$ base64 -d a.ldif
<BLSConfigItem><URLList><URL>http://192.168.242.146:8080/iam/im/ETACALLBACK/?env=identityEnv</URL></URLList><Misc><LogLevel>2</LogLevel><SuspendSending>No</SuspendSending><Password>{3DES}6dFlqaWCFp36FxWzfpLb9NKSJRisEsPKInbtIdpuzdIYZY+Hy4w9XNSbQE2isoDeS6VEU1cJI6kxj6u8DHsu5MGMKOiArA/PHBGL96ftoVh5ox3FN73K7YJn1FHe6ttDyIe4jYGdVbGtjmWe57Rh8HYAys1cp5xb5csSxrdAByGnzwGNlCeZJzlWX5aeP1As</Password></Misc><BLSEnvironments><BLSEnvironment><BLSEnvironmentURL>http://192.168.242.146:8080/iam/im/ETACALLBACK/?env=identityEnv</BLSEnvironmentURL><BLSEvents><BLSEvent>Add_Account</BLSEvent><BLSEvent>Delete_Provisioning_Object</BLSEvent><BLSEvent>Add_Global_User</BLSEvent><BLSEvent>Modify_Endpoint</BLSEvent><BLSEvent>Suspend_Account</BLSEvent><BLSEvent>Modify_Account</BLSEvent><BLSEvent>Delete_Endpoint_Type</BLSEvent><BLSEvent>Rename_Role</BLSEvent><BLSEvent>Delete_Provisioning_Role</BLSEvent><BLSEvent>Add_Explore_Container</BLSEvent><BLSEvent>Suspend_Global_User</BLSEvent><BLSEvent>Delete_Explore_Container</BLSEvent><BLSEvent>Modify_Explore_Container</BLSEvent><BLSEvent>Modify_Account_Template</BLSEvent><BLSEvent>Add_Explore_Object</BLSEvent><BLSEvent>Move_Provisioning_Object</BLSEvent><BLSEvent>Add_Provisioning_Role</BLSEvent><BLSEvent>Add_Endpoint</BLSEvent><BLSEvent>Delete_Account_Template</BLSEvent><BLSEvent>Rename_Provisioning_Object</BLSEvent><BLSEvent>Delete_Global_User</BLSEvent><BLSEvent>Delete_EndPoint</BLSEvent><BLSEvent>Modify_Global_User</BLSEvent><BLSEvent>Modify_Explore_Object</BLSEvent><BLSEvent>Modify_Provisioning_Role</BLSEvent><BLSEvent>Rename_Global_User</BLSEvent><BLSEvent>Unlock_Global_User</BLSEvent><BLSEvent>Modify_Endpoint_Type</BLSEvent><BLSEvent>Add_Provisioning_Object</BLSEvent><BLSEvent>Modify_Provisioning_Object</BLSEvent><BLSEvent>Unlock_Account</BLSEvent><BLSEvent>Resume_Global_User</BLSEvent><BLSEvent>Add_Endpoint_Container</BLSEvent><BLSEvent>Modify_Account_Password</BLSEvent><BLSEvent>Delete_Explore_Object</BLSEvent><BLSEvent>Modify_Global_User_Password</BLSEvent><BLSEvent>Delete_Account</BLSEvent><BLSEvent>Add_Account_Template</BLSEvent><BLSEvent>Delete_EndPoint_Container</BLSEvent><BLSEvent>Add_Endpoint_Type</BLSEvent><BLSEvent>Resume_Account</BLSEvent></BLSEvents></BLSEnvironment></BLSEnvironments></BLSConfigItem>
We can see that by having these values near the IM Provisioning Tier, the notify DSA will now be restricted of selected events, where the XML tag of <BLSEvent> is the "blocking" description of the provisioning event.
The only way to modify this attribute, will be via the IM User Console.
- or using an LDAP client, e.g. Jxplorer.
To avoid the unnecessary audit events for EXPLORE operations, we will select these six "explore" events:
<BLSEvent>Add_Explore_Container</BLSEvent>
<BLSEvent>Delete_Explore_Container</BLSEvent>
<BLSEvent>Modify_Explore_Container</BLSEvent>
<BLSEvent>Add_Explore_Object</BLSEvent>
<BLSEvent>Modify_Explore_Object</BLSEvent>
<BLSEvent>Delete_Explore_Object</BLSEvent>
We can see these names of the events, are what were captured with the command:
dxsearch -h `hostname` -p 20398 -c -x -D "eTDSAContainerName=DSAs,eTNamespaceName=CommonObjects,dc=etadb" -w "Password01" -b dc=notify,dc=etadb | grep eTNotifyProv
NOTE: It is important to restart the Provisioning Server service, to allow it to be aware of the new Inbound Sync Configurations.
- If not, then events will still be processed, and can be validated with the command above or the below example:
watch -n 2 "dxsearch -h `hostname` -p 20398 -c -x -D ainerName=DSAs,eTNamespaceName=CommonObjects,dc=etadb" -w "Password01" -b dc=ntadb | grep eTNotifyProv | wc -l"

Cheers,
A.
Edit 3/3/2018.
Curious, but the attribute, eTConfigPayload, does not appear in the tool SoftTerra LDAP browser; and I am seeing Explore events.
- Will research.

However, the command Line to view this base64 entry directly, does show the value set to ignore explore events.
dxsearch -LLL -h `hostname` -p 20396 -c -x -D "eTDSAContainerName=DSAs,eTNamespaceName=CommonObjects,dc=etadb" -w "Password01" -b "eTConfigName=BLS Connectivity Configuration,eTConfigContainerName=Configuration,eTNamespaceName=CommonObjects,dc=im,dc=etadb" eTConfigPayload | perl -p00e 's/\r?\n //g' | awk '{print $2}' | grep -v "eTConfigName=BLS" | base64 -d

Resolution: Bounce all services to ensure no cache entries.
Additional check that notify is not being flood with explore operation. View the IMPS/log/etatrans*.logs.
Before size and after size (growth), with roll-over at 100 MB.

Example if the EXPLORE is being "allowed" to be captured and not ignored.
- Note string: "Add_Explore_Object"
