XYGATE Compliance PRO (XSW) Reference Manual
XYPRO Technology Corporation 93 Proprietary and Confidential
Chapter 5. Collection Specifications
A Collection Specification is the definition of the data to collect and the calendar defining when
to collect the information. A collection definition always includes Users and Aliases; all other
system resources can be defined to be part of the collection. Additionally, you can configure
what automatic updates the xswLoader program will make when the collection is loaded.
5.1 Deciding How to Define your Collections
Collections are most useful when all of the nodes in your NonStop server network are
included in a single collection. Queries are easier, reports contain all the data, and
policies span your network enterprise environment. Because XSW supports multiple
connections, you can configure a collection to use your resources most efficiently.
5.1.1 Standard Single-node Collection
A standard single-node collection is the easiest format for tracking the node separately
and makes the most sense if the security patterns are different for each node. For
instance, security regulations for a test node may be quite different than for a
production node, therefore policies may be different.
You must have the XSW host and XTR host software installed on each node. You will
connect to each node separately to manage collections.
5.1.2 Standard Multi-node Collection
A standard multi-node collection is the most desirable choice. It can be used when you
have all the nodes you want to be able to compare connected to the host connection
node via Expand. All of the Expand-connected nodes have XSW host software
installations, but only the host connection node installation is connected to when
logging on to the NonStop host. The SWACL file (Appendix B:) on the host connection
node lists all of the Expand-connected nodes.
When the XSW GUI component starts on the PC, it is configured to show all of the
nodes, along with the disks defined for each node. You can configure a collection to
collect the same entities across all of the nodes, making comparisons between nodes
very easy. When a collection is complete, only one download operation is necessary to
build the connection on the PC.
Clusters of “like” nodes are most likely to be joined in a multi-node collection. Security
policies would generally be applied in a similar manner on all nodes.