000032291 - Does the Data Access Governance (DAG) StealthAudit File Scan change any settings in RSA Identity Governance & Lifecycle?

Document created by RSA Customer Support Employee on Jun 14, 2016Last modified by RSA Customer Support on Aug 28, 2020
Version 3Show Document
  • View in full screen mode

Article Content

Article Number000032291
Applies ToRSA Product Set: RSA Identity Governance & Lifecycle 
RSA Version/Condition: 6.9.1, 7.0
StealthAudit Version: 6.3
IssueDoes the RSA Identity Governance & Lifecycle Data Access Governance (DAG) StealthAUDIT file scanning change any system settings such as:
  • Metadata
  • File attributes
  • Backups
and could it potentially start a Network Attached Storage (NAS) file replication?
ResolutionRSA Identity Governance & Lifecycle Data Access Governance relies on the StealthAUDIT third party tool to collect DAG resource information.

StealthAUDIT is a Read Only application and as such it does NOT modify the metadata of the files being scanned.

StealthAUDIT does NOT open the file, so there should be no last accessed date change and no triggered replication across servers.