XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
 Compliance PRO
™
 Reference Manual    
Contents 
XYPRO Technology Corporation  x  Proprietary and Confidential 
11.7.1  Files by User Query .................................................195 
11.7.2  Files Owners Query .................................................195 
11.8  XAC Access Analysis .............................................................196 
11.8.1  The XAC Access Queries ............................................197 
11.8.2  ACLGROUPS Query ..................................................198 
11.8.3  ALLOW/DENY by Command Query ................................198 
11.8.4  COMMANDS Query ...................................................199 
11.8.5  Commands by User Query ..........................................199 
11.8.6  List by Object Query ...............................................199 
11.8.7  List by Run-as User Query .........................................200 
11.8.8  Userlist by Command Query .......................................200 
11.9  OSS Files ..........................................................................200 
11.9.1  The OSS Access Queries ............................................202 
Chapter 12.  XSW Auditing and Audit Reporting................................................. 205 
12.1  XSW within the XYGATE Audit Architecture .................................205 
12.1.1  Audit Configuration .................................................205 
12.1.2  Audit Collection .....................................................205 
12.1.3  Audit Reporting .....................................................206 
12.2  Audit Configuration .............................................................206 
12.2.1  Audit Locations: Diskfiles, Local Processes, IP Processes .....206 
12.2.2  Audit Diskfile Creation and Rollover .............................207 
12.3  Audit Collection .................................................................207 
12.3.1  XSW Audit Record Format .........................................208 
12.4  Audit Reporting ..................................................................209 
12.4.1  Required Host Access for Running Reports ......................209 
12.4.2  Generating Host Audit Reports using XSW_REPORT ............210 
12.4.3  Designing Your Own Custom Audit Reports (REPMAC) .........220 
12.4.4  Designing Your Own Host ENFORM Report (REPSAMP) .........221 
Chapter 13.  EMS Message Format Templates ................................................... 223 
Appendix A:  The SWCONF File ..................................................................... 227 
A1:  The SWCONF File Keywords....................................................227 
A2:  Sample SWCONF File ............................................................228
A3:  AU
DIT (Filename) ...............................................................229 
A4:  AUDIT (Process Name) ..........................................................229 
A5:  AUDIT (IP Process Name) .......................................................230 
A6:  BATCH_CLASS ....................................................................231 










