Does the Data Access Governance (DAG) StealthAudit File Scan change any settings in RSA Identity Governance & Lifecycle?
3 years ago
Originally Published: 2015-12-30
Article Number
000062941
Applies To
RSA Product Set: RSA Identity Governance & Lifecycle 
RSA Version/Condition: 6.9.1, 7.0
StealthAudit Version: 6.3
 
Issue
Does the RSA Identity Governance & Lifecycle Data Access Governance (DAG) StealthAUDIT file scanning change any system settings such as:
  • Metadata
  • File attributes
  • Backups
and could it potentially start a Network Attached Storage (NAS) file replication?
 
Resolution
RSA Identity Governance & Lifecycle Data Access Governance relies on the StealthAUDIT third party tool to collect DAG resource information.

StealthAUDIT is a Read Only application and as such it does NOT modify the metadata of the files being scanned.

StealthAUDIT does NOT open the file, so there should be no last accessed date change and no triggered replication across servers.