XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
Compliance PRO
™
Reference Manual
Contents
XYPRO Technology Corporation x Proprietary and Confidential
11.7.1 Files by User Query .................................................195
11.7.2 Files Owners Query .................................................195
11.8 XAC Access Analysis .............................................................196
11.8.1 The XAC Access Queries ............................................197
11.8.2 ACLGROUPS Query ..................................................198
11.8.3 ALLOW/DENY by Command Query ................................198
11.8.4 COMMANDS Query ...................................................199
11.8.5 Commands by User Query ..........................................199
11.8.6 List by Object Query ...............................................199
11.8.7 List by Run-as User Query .........................................200
11.8.8 Userlist by Command Query .......................................200
11.9 OSS Files ..........................................................................200
11.9.1 The OSS Access Queries ............................................202
Chapter 12. XSW Auditing and Audit Reporting................................................. 205
12.1 XSW within the XYGATE Audit Architecture .................................205
12.1.1 Audit Configuration .................................................205
12.1.2 Audit Collection .....................................................205
12.1.3 Audit Reporting .....................................................206
12.2 Audit Configuration .............................................................206
12.2.1 Audit Locations: Diskfiles, Local Processes, IP Processes .....206
12.2.2 Audit Diskfile Creation and Rollover .............................207
12.3 Audit Collection .................................................................207
12.3.1 XSW Audit Record Format .........................................208
12.4 Audit Reporting ..................................................................209
12.4.1 Required Host Access for Running Reports ......................209
12.4.2 Generating Host Audit Reports using XSW_REPORT ............210
12.4.3 Designing Your Own Custom Audit Reports (REPMAC) .........220
12.4.4 Designing Your Own Host ENFORM Report (REPSAMP) .........221
Chapter 13. EMS Message Format Templates ................................................... 223
Appendix A: The SWCONF File ..................................................................... 227
A1: The SWCONF File Keywords....................................................227
A2: Sample SWCONF File ............................................................228
A3: AU
DIT (Filename) ...............................................................229
A4: AUDIT (Process Name) ..........................................................229
A5: AUDIT (IP Process Name) .......................................................230
A6: BATCH_CLASS ....................................................................231