The coexistence utility runs the eTrust Audit plug-in to scan the computer for eTrust Audit Version 1.5 registry keys and files before the CA Access Control installation begins, as follows:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\acdistagn.exe
If successful it extracts the "Path" value designated %PathFromRegistry%.
If the registry key exists, the plug-in:
FilePathFromRegistry\bin\acactmgr.exe FilePathFromRegistry\bin\SeLogRcd.exe FilePathFromRegistry\bin\acdistagn.exe FilePathFromRegistry\acdistsrv.exe FilePathFromRegistry\acfwrecd.exe FilePathFromRegistry\acrecorderd.exe FilePathFromRegistry\aclogrd.exe FilePathFromRegistry\portmap.exe FilePathFromRegistry\SeLogRec.exe FilePathFromRegistry\SeLogRd.exe FilePathFromRegistry\snmprec.exe
This is the default action as defined in the response file. The eTrust Audit plug-in does not add a trusted program (SPECIALPGM) rule by default.
If a more recent version of eTrust Audit is installed, it stops the following services:
The coexistence utility also runs the eTrust Audit plug-in to:
Note: The response file determines the default action that the coexistence utility performs at prescribed stages (what to do before CA Access Control installation, after CA Access Control installation, and so on).
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |