XYGATE Compliance PRO (XSW) Reference Manual

XYGATE
®
Compliance PRO
Reference Manual
Glossary
XYPRO Technology Corporation 262 Proprietary and Confidential
Note: Not all Security Query/Rules that are defined will lead to a policy. A security
query/rule lists security information without tracking.
A Best Practice policy is defined by XYPRO and optionally updated by the customer. A
dataset is matched against a set of Best Practice policies to produce a snapshot
picture of the current state of the NonStop server host.
PRIMARY COLLECTION
In an environment where there is a single host connection, all collections are Primary
Collections in that they are self-contained and do not require additional collections to
be merged in for reporting purposes.
In an environment where there are multiple host connections and it is necessary to
make one massive collection for all the data gathered, one collection for one host
connection is designated as the primary collection. Subordinate collections with the
same name are merged into the primary collection, which results in a merged
collection.
REPMAC
This is a sample report macro found in the Install subvol. It runs a complete audit
report for the previous week and can also be set up in NetBatch to run every week.
RESOURCE GROUP
A resource group is a map of the data to be collected by collection entity and
system(s) from which the data will be collected. A resource group is specific for a host
connection, which may have a single NonStop server host or multiple NonStop
servers connected via EXPAND.
RESULT
A result is generated when a security rule/query is applied to a collection. The result
displays individual data items within the collection that meet the conditions set forth in
the security rule in a spreadsheet format within the XSW client interface.
SECURITY RULE ENTITY
A security rule entity defines the type of information for which values on one or more
attributes will be specified in the security rule. Security rule entities are different from
collection entities, because collection entities can encompass more than one security
rule entity, such as the collection entity USERS/ALIASES, which encompasses Users,
Aliases and Filesharing Groups. Security rule entities have individual attributes that
represent the individual characteristics of data items within the entity.