Are there any restrictions to using StealthAUDIT with the RSA Identity Governance & Lifecycle license of StealthAUDIT?
Originally Published: 2018-02-21
Article Number
Applies To
RSA Product/Service Type: Data Access Governance (DAG), StealthAUDIT
RSA Version/Condition: All
Issue
Resolution
This license does not restrict the number of servers for which you collect unstructured data using StealthAUDIT. However, there is a soft limit of 99,999 host nodes; which, if exceed, will severely impact performance and resources. The StealthAUDIT console will also warn the user if this limit is exceeded.
There are a number of restrictions, and those are outlined below and also documented in the RSA Identity Governance & Lifecycle - Deployment of Data Access Governance with StealthAUDIT x.x documents found on RSA Link's Data Access Governance page.
RSA License Restrictions
The following sections describe features that are not included in the RSA-provided license for StealthAUDIT 8.0.
FS Reporting Solution
The RSA license for the StealthAUDIT 8-series does not include the FS Reporting Solution. The job types included with the FS Reporting Solution are:
- Open Access
- Direct Permissions
- Broken Inheritance
- Content
- Activity
- Probable Owner, except as noted in Supported Probable Owner Jobs section of the document
- Ad Hoc Audits
Supported Probable Owner Jobs
The FileSystem and SharePoint Probable Owner jobs are included in FileSystem and SharePoint compatibility jobs. After installing 4-IMG FS Compatibility and 4-IMG SP Compatibility jobs, Probable Owner data is collected when the appropriate 0.Collection jobs are run. Probable Owners does not support Unix, because the owners are based on Active Directory users.Sensitive Data Add-On Package
The RSA license for the StealthAUDIT 8-series does not include the Sensitive Data add-on package. This includes the following features:- Collection Seek Scans
- Seek Bulk Import
- Sensitive Data Job
To use features that are not included with the RSA-provided license, contact StealthBITS directly to purchase the Sensitive Data package, which requires a separate license key.
Unixand Linux Permissions Scanning
The RSA license for the StealthAUDIT 8-series does not support Unix or Linux permissions scanning using the Unix Solution Set. As a result, scanning configuration files on Unix servers, such as Samba config files and sudo rights, is not supported. To scan these files, contact StealthBITS to purchase the additional required license for this feature.The RSA license key allows collection of Unix permissions applied to shared folders using the FileSystem job group. For more information see "Collect Samba and NFS Shares Using the FileSystem Job Group" in the Deployment document.
Related Articles
Is there an RSA Authentication Manager local database Connector and Collector for RSA Identity Governance and Lifecycle? 56Number of Views Is there a web services collector type in RSA Identity Governance & Lifecycle? 4Number of Views Is there a tool to test your SID800 PIN with RSA Middleware? 13Number of Views Is there a list of KCA error messages and their definitions? 3Number of Views There is no option to clear the mysql-connector-java-{version}-bin.jar file from the MySQL AFX connector template in RSA I… 187Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory
Don't see what you're looking for?