Previous Topic: How the Windows Plug-In Works

Next Topic: How the eTrust Audit80 Plug-In Works

How the eTrust Audit Plug-In Works

The coexistence utility runs the eTrust Audit plug-in to scan the computer for eTrust Audit Version 1.5 registry keys and files before the CA Access Control installation begins, as follows:

  1. Queries the following registry key for existence:
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\acdistagn.exe
    
    If successful it extracts the "Path" value designated %PathFromRegistry%.
    

    If the registry key exists, the plug-in:

  2. Stops the following services:

    If a more recent version of eTrust Audit is installed, it stops the following services:

  3. When the CA Access Control installation completes, it restarts these same services.

The coexistence utility also runs the eTrust Audit plug-in to:

Note: The response file determines the default action that the coexistence utility performs at prescribed stages (what to do before CA Access Control installation, after CA Access Control installation, and so on).