XYGATE Compliance PRO (XSW) Reference Manual
XYGATE
®
Compliance PRO
™
Reference Manual
Contents
XYPRO Technology Corporation ix Proprietary and Confidential
8.9 Copying Best Practices and Custom Best Practices ........................162
8.9.1 Copying Logic ........................................................162
8.9.2 Copying Rules from One Node to Another Node ................164
8.9.3 Target Node Selection..............................................165
8.9.4 Copy Results Message Box .........................................166
8.9.5 Resolution Screen ...................................................167
Chapter 9. System Integrity Checks ............................................................. 169
9.1 Loading Integrity Checks .......................................................169
9.2 Initial Integrity Checks .........................................................169
9.3 Available Integrity Checks .....................................................170
9.4 Integrity Checks for Guardian Files and OSS Files ..........................172
9.5 Reviewing an Integrity Check .................................................173
9.6 Accepting a New Baseline ......................................................174
9.7 Integrity Check Detail ..........................................................174
9.8 Creating an Integrity Check ...................................................176
9.9 Viewing the List Tab ............................................................177
Chapter 10. XYGATE Products Configuration.................................................... 179
10.1 Loading XYGATE Product Configurations ....................................179
10.2 Products Configuration Display................................................179
10.3 Side-by-Side Comparison of Discrepancies ..................................180
10.4 View Baseline Text ..............................................................180
10.5 Accept a New Baseline .........................................................181
Chapter 11. Access Analysis Mapping ............................................................. 183
11.1 Loading Access Maps and Access Data .......................................183
11.2 Saving Map Selections ..........................................................183
11.3 Review Results...................................................................183
11.4 XOS Access Analysis .............................................................185
11.4.1 How User-Related Entries are Expanded in XOS Queries ......187
11.4.2 The XOS Access Queries ............................................188
11.5 Safeguard.........................................................................190
11.5.1 How User Entries are Expanded in Safeguard Queries .........192
11.5.2 The Safeguard Access Queries ....................................192
11
.6 NonStop Guardian Files ........................................................194
11.7 The Guardian Access Queries ..................................................195