XYGATE Compliance PRO (XSW) Reference Manual
X XYGATE
®
Compliance PRO
™
Reference Manual
Chapter 7. System Policy Analyzer
XYPRO Technology Corporation 143 Proprietary and Confidential
7.5.2 Drilling Down for More Information about a Result Item
Double-click on any grid line to display (or drill down) the grid data in text form as
shown below. This format may be easier to print or review.
You can double click on any grid line to provide the grid data in a text format.
7.5.3 Choosing Items to Exclude from Consideration
Inevitably, there will be some policy items that must not be remedied. Though their
security settings seemingly violate security policy, they are authorized to do so and, in
fact, would not work properly without these security settings.
For example, if the security policy being analyzed is that all PROGID files must be on
$SYSTEM, then three files that are part of the XSW host installation: OSSLIB,
USERINFO, and ACLINFO, which must have the PROGID feature set to execute
properly across a network, could be failures because XSW is generally not installed on
the $SYSTEM disk. You need a way to exclude these items from consideration, so that
they are documented as excluded and never brought up again for consideration. The
Exclude button is provided to make the exclusion explicit.
To exclude one or more Security Policy items from the list, select the rows you want to
exclude. Click Exclude. The items are eliminated from the Failed Items list. They have
moved to the Excluded Items list, where they will reside until they are deleted or
resolved.