The coexistence utility runs the BrightStor plug-in to scan the computer for CA BrightStor registry keys and executables at the end of a CA Access Control installation and whenever the utility runs, as follows:
HKLM\SOFTWARE\ComputerAssociates\BrightStor ARCserve Backup\UniversalClientAgent\Common HKLM\SOFTWARE\ComputerAssociates\Cheetah\UniversalClientAgent\Common HKLM\SOFTWARE\ComputerAssociates\BrightStor Enterprise Backup\UniversalClientAgent\Common
When the first registry key exists, the plug-in:
FilePathFromRegistry\UnivAgent.exe
This is the default action as defined in the response file.
HKLM\SOFTWARE\ComputerAssociates\BrightStor ARCserve Backup\Base\Path HKLM\SOFTWARE\ComputerAssociates\Cheetah\Base\Path HKLM\SOFTWARE\ComputerAssociates\BrightStor Enterprise Backup\Base\Path
When the first registry key exists, the plug-in:
FilePathFromRegistry\carunjob.exe
This is the default action as defined in the response file.
HKLM\SOFTWARE\ComputerAssociates\ARCserveIT\Base\Path
If the registry key exists, the plug-in:
FilePathFromRegistry\ASRunJob.exe
This is the default action as defined in the response file.
HKLM\SOFTWARE\ComputerAssociates\CA BAOF\CurrentVersion HKLM\SOFTWARE\ComputerAssociates\BrightStor Backup Agent for Open Files\CurrentVersion
When the first registry key exists, the plug-in:
This is the default action as defined in the response file.
Note: The response file determines the default action that the coexistence utility performs at prescribed stages (what to do before CA Access Control installation, after CA Access Control installation, and so on).
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |