Previous Topic: How the Dr. Watson Plug-In Works

Next Topic: How the Scout Plug-In Works


How the eTrust AV Plug-In Works

The coexistence utility runs the eTrust AV plug-in to scan the computer for CA Antivirus registry keys and executables at the end of a CA Access Control installation and whenever the utility runs, as follows:

  1. Reads the following registry key entry values:
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\InocIT.Exe\Path
    HKLM\SOFTWARE\ComputerAssociates\eTrustITM\CurrentVersion\Path\Home
    

    If one of the entries returns a value, the plug-in creates the following SPECIALPGM resources of type DCM:

    This is the default action as defined in the response file.

  2. Reads the following registry key entry value:
    HKLM\SOFTWARE\ComputerAssociates\ScanEngine\Path\Engine
    

    If the entry returns a value, the plug-in creates the following SPECIALPGM resource of type DCM:

    FilePathFromRegistry\InoCmd32.exe
    

Note: The response file determines the default action that the coexistence utility performs at prescribed stages (what to do before CA Access Control installation, after CA Access Control installation, and so on).