000036054 - Are there any restrictions to using StealthAUDIT with the RSA Identity Governance & Lifecycle license of StealthAUDIT?

Document created by RSA Customer Support Employee on Mar 3, 2018Last modified by RSA Customer Support Employee on Mar 5, 2018
Version 2Show Document
  • View in full screen mode

Article Content

Article Number000036054
Applies ToRSA Product Set: RSA Identity Governance & Lifecycle
RSA Product/Service Type: Data Access Governance (DAG), StealthAUDIT
RSA Version/Condition: All
IssueAre there any restrictions to using StealthAUDIT with the RSA Identity Governance & Lifecycle license of StealthAUDIT?
ResolutionThe RSA Identity Governance & Lifecycle Data Access Governance license is provided to customers who have purchased the Data Access Governance module.

This license does not restrict the number of servers for which you collect unstructured data using StealthAUDIT.  However, there is a soft limit of 99,999 host nodes; which, if exceed, will severely impact performance and resources. The StealthAUDIT console will also warn the user if this limit is exceeded.   

There are a number of restrictions, and those are outlined below and also documented in the RSA Identity Governance & Lifecycle - Deployment of Data Access Governance with StealthAUDIT x.x documents found on RSA Link's Data Access Governance page.
 

RSA License Restrictions


The following sections describe features that are not included in the RSA-provided license for StealthAUDIT 8.0.


FS Reporting Solution


The RSA license for the StealthAUDIT 8-series does not include the FS Reporting Solution. The job types included with the FS Reporting Solution are:

  • Open Access
  • Direct Permissions
  • Broken Inheritance
  • Content
  • Activity
  • Probable Owner, except as noted in Supported Probable Owner Jobs section of the document
  • Ad Hoc Audits
To use job types that are not included with the RSA-provided license, contact StealthBITS directly to purchase the FS Reporting Solution, which requires a separate license key.


Supported Probable Owner Jobs


The FileSystem and SharePoint Probable Owner jobs are included in FileSystem and SharePoint compatibility jobs. After installing 4-IMG FS Compatibility and 4-IMG SP Compatibility jobs, Probable Owner data is collected when the appropriate 0.Collection jobs are run. Probable Owners does not support Unix, because the owners are based on Active Directory users.
 

Sensitive Data Add-On Package


The RSA license for the StealthAUDIT 8-series does not include the Sensitive Data add-on package. This includes the following features:

  • Collection Seek Scans
  • Seek Bulk Import
  • Sensitive Data Job

To use features that are not included with the RSA-provided license, contact StealthBITS directly to purchase the Sensitive Data package, which requires a separate license key.
 

Unixand Linux Permissions Scanning


The RSA license for the StealthAUDIT 8-series does not support Unix or Linux permissions scanning using the Unix Solution Set. As a result, scanning configuration files on Unix servers, such as Samba config files and sudo rights, is not supported. To scan these files, contact StealthBITS to purchase the additional required license for this feature.

The RSA license key allows collection of Unix permissions applied to shared folders using the FileSystem job group.  For more information see "Collect Samba and NFS Shares Using the FileSystem Job Group" in the Deployment document. 

Attachments

    Outcomes