XYGATE Compliance PRO (XSW) Reference Manual
X XYGATE
®
 Compliance PRO
™
 Reference Manual    
Chapter 7. System Policy Analyzer 
XYPRO Technology Corporation  143  Proprietary and Confidential 
7.5.2  Drilling Down for More Information about a Result Item 
Double-click on any grid line to display (or drill down) the grid data in text form as 
shown below. This format may be easier to print or review. 
You can double click on any grid line to provide the grid data in a text format. 
7.5.3  Choosing Items to Exclude from Consideration 
Inevitably, there will be some policy items that must not be remedied. Though their 
security settings seemingly violate security policy, they are authorized to do so and, in 
fact, would not work properly without these security settings.  
For example, if the security policy being analyzed is that all PROGID files must be on 
$SYSTEM, then three files that are part of the XSW host installation: OSSLIB, 
USERINFO, and ACLINFO, which must have the PROGID feature set to execute 
properly across a network, could be failures because XSW is generally not installed on 
the $SYSTEM disk. You need a way to exclude these items from consideration, so that 
they are documented as excluded and never brought up again for consideration. The 
Exclude button is provided to make the exclusion explicit. 
To exclude one or more Security Policy items from the list, select the rows you want to 
exclude. Click Exclude. The items are eliminated from the Failed Items list. They have 
moved to the Excluded Items list, where they will reside until they are deleted or 
resolved. 










