|
Elvis,
NetIQ's RRM (Remote Request Management) does indeed allow for the
co-existence of a user exit program. When working with exit points,
Option 11=Install/Retain Exit will facilitate that.
The option installs an RRM Exit Program at sequence 1, and the custom
Exit Program is retained as a customer Exit Program to be called by the
RRM Exit Program. When the RRM Exit Program is called, this option
causes RRM to pass the original transaction and the RRM decision on the
transaction to the customer Exit Program. The customer exit program can
keep or reverse the original RRM decision. RRM will then enforce the
decision made by the customer Exit Program.
> message: 3
> date: Thu, 22 Jul 2004 14:28:23 -0500
> from: "Elvis Budimlic" <ebudimlic@xxxxxxxxxxxxxxxxxxxxxxxxx>
> subject: Net-IQ exit point
>
> I'm interested if anyone from Net-IQ or using their exit point
security software can clear something up for me, by private email if
possible.
> Does Net-IQ's exit point security product permit for "daisy chaining"
of exit point programs?
>
> Basically, if one already exists at the time of install do they make
sure it is invoked by their exit point program?
>
> And more importantly, does Net-IQ's exit point program know/care if it
is "daisy chained" and invoked by another exit point program?
Best regards,
Steven W. Martinson, CISSP, CISM
Manager of OutLink Security
Jack Henry & Associates, Inc.
7800 Willowchase Blvd.
Houston, TX. 77070
voice 281.517.8000
external fax 281.517.8157
internal ext 471800
NOTICE: This electronic mail message and any files transmitted with it are
intended exclusively for the individual or entity to which it is addressed. The
message, together with any attachment, may contain confidential and/or
privileged information. Any unauthorized review, use, printing, saving,
copying, disclosure or distribution is strictly prohibited. If you have
received this message in error, please immediately advise the sender by reply
email and delete all copies.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.