XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
 Compliance PRO
™
 Reference Manual    
Introduction 
XYPRO Technology Corporation  xiv  Proprietary and Confidential 
Once the data is integrated into the PC or network server database, there are several 
ways to make enquiries of the data. Some of these methods are automated. Others 
allow you to query the data and build your own rules. 
Data Discovery Queries 
Data Discovery Queries are SQL queries built by the user using an easy interface that 
allows the query to be built using drop-down lists for items to be queried and values to 
query for. 
System Policy 
System policies are queries that are designed to be checked every time the relevant 
dataset is loaded. Entries are tracked with a history of work and the ability to enter 
notes. 
Best Practices 
Best Practices document a single characteristic of a single object, comparing it to the 
expected value. The expected values are built from the Best Practices defined in: 
•  HP NonStop Server Security: A Practical Handbook 
(ISBN: 978-1-55558-314-9) 
•  Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS & SQL 
(ISBN: 978-1-55558-344-6) 
Integrity Checks 
Integrity Checks match a baseline of files and/or characteristics of files or objects that 
meet a pattern to the characteristics of those items from the previous collection of 
Integrity data. Additions, deletions and changes of the items from one collection to the 
next are documented. 
XYGATE Product Integrity 
The XYGATE Product set of queries matches the characteristics of the xxCONF and 
xxACL file for each XYGATE Security solution module in use to the values that those 
files had during the previous execution, highlighting differences in the files from one 
data collection to the next. 
Access Analysis Mapping 
Access mapping provides a way to discover which users can do what to which files 
based on Guardian, OSS, Safeguard, XAC and XOS implementations. 
PCI/HIPAA/SOX Alternate Mapping 
Regulation-based mapping for the System Policies, Integrity Checks, and Best 
Practices have been created, so that it is easy to print reports for these governmental 
and industry requirements. 










