|Applies To||RSA Product Set: RSA Identity Governance & Lifecycle |
RSA Version/Condition: 6.9.1, 7.0
StealthAudit Version: 6.3
|Issue||Does the RSA Identity Governance & Lifecycle Data Access Governance (DAG) StealthAUDIT file scanning change any system settings such as:|
|Resolution||RSA Identity Governance & Lifecycle Data Access Governance relies on the StealthAUDIT third party tool to collect DAG resource information.|
StealthAUDIT is a Read Only application and as such it does NOT modify the metadata of the files being scanned.
StealthAUDIT does NOT open the file, so there should be no last accessed date change and no triggered replication across servers.