Are there any restrictions to using StealthAUDIT with the RSA Identity Governance & Lifecycle license of StealthAUDIT?
Originally Published: 2018-02-21
Article Number
Applies To
RSA Product/Service Type: Data Access Governance (DAG), StealthAUDIT
RSA Version/Condition: All
Issue
Resolution
This license does not restrict the number of servers for which you collect unstructured data using StealthAUDIT. However, there is a soft limit of 99,999 host nodes; which, if exceed, will severely impact performance and resources. The StealthAUDIT console will also warn the user if this limit is exceeded.
There are a number of restrictions, and those are outlined below and also documented in the RSA Identity Governance & Lifecycle - Deployment of Data Access Governance with StealthAUDIT x.x documents found on RSA Link's Data Access Governance page.
RSA License Restrictions
The following sections describe features that are not included in the RSA-provided license for StealthAUDIT 8.0.
FS Reporting Solution
The RSA license for the StealthAUDIT 8-series does not include the FS Reporting Solution. The job types included with the FS Reporting Solution are:
- Open Access
- Direct Permissions
- Broken Inheritance
- Content
- Activity
- Probable Owner, except as noted in Supported Probable Owner Jobs section of the document
- Ad Hoc Audits
Supported Probable Owner Jobs
The FileSystem and SharePoint Probable Owner jobs are included in FileSystem and SharePoint compatibility jobs. After installing 4-IMG FS Compatibility and 4-IMG SP Compatibility jobs, Probable Owner data is collected when the appropriate 0.Collection jobs are run. Probable Owners does not support Unix, because the owners are based on Active Directory users.Sensitive Data Add-On Package
The RSA license for the StealthAUDIT 8-series does not include the Sensitive Data add-on package. This includes the following features:- Collection Seek Scans
- Seek Bulk Import
- Sensitive Data Job
To use features that are not included with the RSA-provided license, contact StealthBITS directly to purchase the Sensitive Data package, which requires a separate license key.
Unixand Linux Permissions Scanning
The RSA license for the StealthAUDIT 8-series does not support Unix or Linux permissions scanning using the Unix Solution Set. As a result, scanning configuration files on Unix servers, such as Samba config files and sudo rights, is not supported. To scan these files, contact StealthBITS to purchase the additional required license for this feature.The RSA license key allows collection of Unix permissions applied to shared folders using the FileSystem job group. For more information see "Collect Samba and NFS Shares Using the FileSystem Job Group" in the Deployment document.
Related Articles
Is there an RSA Authentication Manager local database Connector and Collector for RSA Identity Governance and Lifecycle? 56Number of Views Is there any RSA Authentication Agent for Mac? 65Number of Views Is there a list of KCA error messages and their definitions? 3Number of Views Is there a tool to test your SID800 PIN with RSA Middleware? 13Number of Views Data Access Review for the file share does not show the accounts which have access to file share via the group in RSA Iden… 35Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?