Are there any restrictions to using StealthAUDIT with the RSA Identity Governance & Lifecycle license of StealthAUDIT?
Originally Published: 2018-02-21
Article Number
Applies To
RSA Product/Service Type: Data Access Governance (DAG), StealthAUDIT
RSA Version/Condition: All
Issue
Resolution
This license does not restrict the number of servers for which you collect unstructured data using StealthAUDIT. However, there is a soft limit of 99,999 host nodes; which, if exceed, will severely impact performance and resources. The StealthAUDIT console will also warn the user if this limit is exceeded.
There are a number of restrictions, and those are outlined below and also documented in the RSA Identity Governance & Lifecycle - Deployment of Data Access Governance with StealthAUDIT x.x documents found on RSA Link's Data Access Governance page.
RSA License Restrictions
The following sections describe features that are not included in the RSA-provided license for StealthAUDIT 8.0.
FS Reporting Solution
The RSA license for the StealthAUDIT 8-series does not include the FS Reporting Solution. The job types included with the FS Reporting Solution are:
- Open Access
- Direct Permissions
- Broken Inheritance
- Content
- Activity
- Probable Owner, except as noted in Supported Probable Owner Jobs section of the document
- Ad Hoc Audits
Supported Probable Owner Jobs
The FileSystem and SharePoint Probable Owner jobs are included in FileSystem and SharePoint compatibility jobs. After installing 4-IMG FS Compatibility and 4-IMG SP Compatibility jobs, Probable Owner data is collected when the appropriate 0.Collection jobs are run. Probable Owners does not support Unix, because the owners are based on Active Directory users.Sensitive Data Add-On Package
The RSA license for the StealthAUDIT 8-series does not include the Sensitive Data add-on package. This includes the following features:- Collection Seek Scans
- Seek Bulk Import
- Sensitive Data Job
To use features that are not included with the RSA-provided license, contact StealthBITS directly to purchase the Sensitive Data package, which requires a separate license key.
Unixand Linux Permissions Scanning
The RSA license for the StealthAUDIT 8-series does not support Unix or Linux permissions scanning using the Unix Solution Set. As a result, scanning configuration files on Unix servers, such as Samba config files and sudo rights, is not supported. To scan these files, contact StealthBITS to purchase the additional required license for this feature.The RSA license key allows collection of Unix permissions applied to shared folders using the FileSystem job group. For more information see "Collect Samba and NFS Shares Using the FileSystem Job Group" in the Deployment document.
Related Articles
Is there a web services collector type in RSA Identity Governance & Lifecycle? 4Number of Views Is there any RSA Authentication Agent for Mac? 67Number of Views RSA Governance & Lifecycle Recipes: Rule Telemetry - Processing (Running Total) 9Number of Views Local Entitlements do not show in the Total Entitlement column under Directories/Applications in RSA Identity Governance &… 28Number of Views There is no option to clear the mysql-connector-java-{version}-bin.jar file from the MySQL AFX connector template in RSA I… 190Number of Views
Trending Articles
How to download and install the AFX Server Archive in RSA Identity Governance & Lifecycle RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide The Template ({Connector Template Name}) has missing file content error when creating AFX Connectors in RSA Identity Gover… Downloading RSA Authentication Manager license files or RSA Software token seed records Troubleshooting RSA MFA Agent for Microsoft Windows
Don't see what you're looking for?