XYGATE Compliance PRO (XSW) Reference Manual
XYPRO Technology Corporation 183 Proprietary and Confidential
Chapter 11. Access Analysis Mapping
The Access Analysis Mapping feature allows you to obtain file access maps for
diskfiles secured with Guardian, OSS, Safeguard, XAC and XOS. The queries allow
you to examine your access rules. You can quickly locate the rules that apply to a
particular file or all the rules that grant a particular user or user group access.
Note: Access mapping is only as good as the data that is collected. If a collection does
not contain all your disks, only the files on those disks that are collected will be
returned in the access maps. This is true for all the available access analysis.
Some of these maps are very complex and may require excessive time to formulate
the results.
11.1 Loading Access Maps and Access Data
Selecting the Saved Access Maps checkbox on the Advanced Loading Selections
tab causes Access Maps to be automatically loaded for any XYGATE products found
on the host. (See item 17 on page 98 in Chapter 5, “Collection Specifications.”)
However, the data loaded is creating an access map to directly relate to the entity. For
instance, Safeguard maps can be queried or saved if Safeguard information is
available from the default collection.
11.2 Saving Map Selections
Map selections can be saved to the treeview for easy and faster recall. When a map is
saved, it is not recomputed when recalled from the treeview. Each map is associated
with a specific collection. Different collections can contain different sets of disks that
can affect the details of maps that use this information. The collection name is shown
on the treeview title for each saved map.
Saved map selections are re-loaded when the associated collection is re-collected and
loaded. This is performed automatically by the XSW loader module, so the maps
always reflect the most recent information.
11.3 Review Results
To build a map, select the tab view of the entity (Guardian, OSS, Safeguard, etc.), the
Query Type, then select or enter appropriate User or File information, and click
Execute.