XYGATE Compliance PRO (XSW) Reference Manual

XYGATE
®
Compliance PRO
Reference Manual
Contents
XYPRO Technology Corporation vi Proprietary and Confidential
2.3.8 Generating Reports .................................................. 36
2.4 Children Windows ................................................................ 38
2.5 Pop-up Windows .................................................................. 39
Chapter 3. Starting Compliance PRO (XSW) the First Time ................................... 41
3.1 Install Database and Start the Connection Wizard .......................... 42
3.2 Setting the User Preferences ................................................... 45
3.3 Connect to Host Node ........................................................... 49
3.4 Completing the First-Full Collection for the First Time .................... 50
3.5 Downloading the First Collection .............................................. 52
3.6 Reviewing the Collection Download Status ................................... 52
3.7 Reviewing the First Set of System Policies ................................... 53
3.8 Reviewing the First Set of Best Practice Policies ............................ 54
3.9 Reviewing the First Set of Integrity Checks .................................. 56
3.10 Reviewing the First Set of XYGATE Product Baselines ...................... 57
3.11 Reviewing the First Set of Access Analysis Maps ............................. 58
3.12 Reviewing the Pre-defined PCI, SOX and HIPAA Tabs ....................... 59
Chapter 4. Common Screen Functions ............................................................ 61
4.1 The Grid Views ................................................................... 61
4.2 Displaying a Drilled-Down Row ................................................. 64
4.3 Sending Email for a Selection .................................................. 65
4.4 Saved References for Policies .................................................. 66
4.4.1 System Policy Analyzer .............................................. 67
4.4.2 Best Practice Policy ................................................. 68
4.4.3 System Integrity Checks ............................................. 69
4.4.4 Access Analysis Mapping ............................................ 70
4.5 Exporting Results for Policies .................................................. 71
4.5.1 Exported File Naming Convention ................................. 72
4.5.2 Exported File Notification Email ................................... 72
4.5.3 Setting Auto-Export ON/OFF ....................................... 73
4.6 Send To ............................................................................ 74
4.6.1 Report Output ........................................................ 75
4.7 XSW Summary and Detailed Reports .......................................... 77
4.8 The Properties Window ......................................................... 78
4.9 The GUI Environment ............................................................ 78
4.10 Connection Configurations ...................................................... 80