XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
 Compliance PRO
™
 Reference Manual    
Glossary 
XYPRO Technology Corporation  262  Proprietary and Confidential 
Note: Not all Security Query/Rules that are defined will lead to a policy. A security 
query/rule lists security information without tracking. 
A Best Practice policy is defined by XYPRO and optionally updated by the customer. A 
dataset is matched against a set of Best Practice policies to produce a snapshot 
picture of the current state of the NonStop server host. 
PRIMARY COLLECTION 
In an environment where there is a single host connection, all collections are Primary 
Collections in that they are self-contained and do not require additional collections to 
be merged in for reporting purposes. 
In an environment where there are multiple host connections and it is necessary to 
make one massive collection for all the data gathered, one collection for one host 
connection is designated as the primary collection. Subordinate collections with the 
same name are merged into the primary collection, which results in a merged 
collection. 
REPMAC 
This is a sample report macro found in the Install subvol. It runs a complete audit 
report for the previous week and can also be set up in NetBatch to run every week. 
RESOURCE GROUP 
A resource group is a map of the data to be collected by collection entity and 
system(s) from which the data will be collected. A resource group is specific for a host 
connection, which may have a single NonStop server host or multiple NonStop 
servers connected via EXPAND. 
RESULT 
A result is generated when a security rule/query is applied to a collection. The result 
displays individual data items within the collection that meet the conditions set forth in 
the security rule in a spreadsheet format within the XSW client interface. 
SECURITY RULE ENTITY 
A security rule entity defines the type of information for which values on one or more 
attributes will be specified in the security rule. Security rule entities are different from 
collection entities, because collection entities can encompass more than one security 
rule entity, such as the collection entity USERS/ALIASES, which encompasses Users, 
Aliases and Filesharing Groups. Security rule entities have individual attributes that 
represent the individual characteristics of data items within the entity. 










