Previous Topic: How the Policy Manager Plug-In Works

Next Topic: How the Dr. Watson Plug-In Works

How the BrightStor Plug-In Works

The coexistence utility runs the BrightStor plug-in to scan the computer for CA BrightStor registry keys and executables at the end of a CA Access Control installation and whenever the utility runs, as follows:

  1. Queries the following registry keys for existence:
    HKLM\SOFTWARE\ComputerAssociates\BrightStor ARCserve Backup\UniversalClientAgent\Common
    HKLM\SOFTWARE\ComputerAssociates\Cheetah\UniversalClientAgent\Common
    HKLM\SOFTWARE\ComputerAssociates\BrightStor Enterprise Backup\UniversalClientAgent\Common
    

    When the first registry key exists, the plug-in:

  2. If the plug-in cannot find any of the registry keys in Step 1, it queries the following registry keys for existence:
    HKLM\SOFTWARE\ComputerAssociates\BrightStor ARCserve Backup\Base\Path
    HKLM\SOFTWARE\ComputerAssociates\Cheetah\Base\Path
    HKLM\SOFTWARE\ComputerAssociates\BrightStor Enterprise Backup\Base\Path
    

    When the first registry key exists, the plug-in:

  3. If the plug-in also cannot find any of the registry keys in Step 2, it queries the following registry key for existence:
    HKLM\SOFTWARE\ComputerAssociates\ARCserveIT\Base\Path
    

    If the registry key exists, the plug-in:

  4. Queries the following registry keys for existence:
    HKLM\SOFTWARE\ComputerAssociates\CA BAOF\CurrentVersion
    HKLM\SOFTWARE\ComputerAssociates\BrightStor Backup Agent for Open Files\CurrentVersion
    

    When the first registry key exists, the plug-in:

Note: The response file determines the default action that the coexistence utility performs at prescribed stages (what to do before CA Access Control installation, after CA Access Control installation, and so on).