|Resolution||The RSA Identity Governance & Lifecycle Data Access Governance license is provided to customers who have purchased the Data Access Governance module.|
This license does not restrict the number of servers for which you collect unstructured data using StealthAUDIT. However, there is a soft limit of 99,999 host nodes; which, if exceed, will severely impact performance and resources. The StealthAUDIT console will also warn the user if this limit is exceeded.
There are a number of restrictions, and those are outlined below and also documented in the RSA Identity Governance & Lifecycle - Deployment of Data Access Governance with StealthAUDIT x.x documents found on RSA Link's page.
RSA License Restrictions
The following sections describe features that are not included in the RSA-provided license for StealthAUDIT 8.0.
FS Reporting Solution
The RSA license for the StealthAUDIT 8-series does not include the FS Reporting Solution. The job types included with the FS Reporting Solution are:
To use job types that are not included with the RSA-provided license, contact StealthBITS directly to purchase the FS Reporting Solution, which requires a separate license key.
- Open Access
- Direct Permissions
- Broken Inheritance
- Probable Owner, except as noted in Supported Probable Owner Jobs section of the document
- Ad Hoc Audits
Supported Probable Owner Jobs
The FileSystem and SharePoint Probable Owner jobs are included in FileSystem and SharePoint compatibility jobs. After installing 4-IMG FS Compatibility and 4-IMG SP Compatibility jobs, Probable Owner data is collected when the appropriate 0.Collection jobs are run. Probable Owners does not support Unix, because the owners are based on Active Directory users.
Sensitive Data Add-On Package
The RSA license for the StealthAUDIT 8-series does not include the Sensitive Data add-on package. This includes the following features:
- Collection Seek Scans
- Seek Bulk Import
- Sensitive Data Job
To use features that are not included with the RSA-provided license, contact StealthBITS directly to purchase the Sensitive Data package, which requires a separate license key.
Unixand Linux Permissions Scanning
The RSA license for the StealthAUDIT 8-series does not support Unix or Linux permissions scanning using the Unix Solution Set. As a result, scanning configuration files on Unix servers, such as Samba config files and sudo rights, is not supported. To scan these files, contact StealthBITS to purchase the additional required license for this feature.
The RSA license key allows collection of Unix permissions applied to shared folders using the FileSystem job group. For more information see "Collect Samba and NFS Shares Using the FileSystem Job Group" in the Deployment document.