The coexistence utility runs the eTrust Audit80 plug-in to scan the computer for eTrust Audit r8 registry keys and files at the end of a CA Access Control installation and whenever the utility runs, as follows:
HKLM\SOFTWARE\ComputerAssociates\eTrust Audit\Paths
If successful it extracts the "Path" value designated %PathFromRegistry%.
If the registry key exists, the plug-in:
FilePathFromRegistry\bin\acactmgr.exe FilePathFromRegistry\bin\SeLogRcd.exe FilePathFromRegistry\bin\acdistagn.exe FilePathFromRegistry\acdistsrv.exe FilePathFromRegistry\acfwrecd.exe FilePathFromRegistry\acrecorderd.exe FilePathFromRegistry\aclogrd.exe FilePathFromRegistry\portmap.exe FilePathFromRegistry\SeLogRec.exe FilePathFromRegistry\SeLogRd.exe FilePathFromRegistry\snmprec.exe
This is the default action as defined in the response file.
Note: The response file determines the default action that the coexistence utility performs at prescribed stages (what to do before CA Access Control installation, after CA Access Control installation, and so on).
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |