× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Elvis,

NetIQ's RRM (Remote Request Management) does indeed allow for the
co-existence of a user exit program.  When working with exit points,
Option 11=Install/Retain Exit will facilitate that.

The option installs an RRM Exit Program at sequence 1, and the custom
Exit Program is retained as a customer Exit Program to be called by the
RRM Exit Program.  When the RRM Exit Program is called, this option
causes RRM to pass the original transaction and the RRM decision on the
transaction to the customer Exit Program. The customer exit program can
keep or reverse the original RRM decision.  RRM will then enforce the
decision made by the customer Exit Program.


> message: 3
> date: Thu, 22 Jul 2004 14:28:23 -0500
> from: "Elvis Budimlic" <ebudimlic@xxxxxxxxxxxxxxxxxxxxxxxxx>
> subject: Net-IQ exit point
> 
> I'm interested if anyone from Net-IQ or using their exit point
security software can clear something up for me, by private email if
possible.  
> Does Net-IQ's exit point security product permit for "daisy chaining"
of exit point programs?
>
> Basically, if one already exists at the time of install do they make
sure it is invoked by their exit point program?
> 
> And more importantly, does Net-IQ's exit point program know/care if it
is "daisy chained" and invoked by another exit point program?

Best regards,

Steven W. Martinson, CISSP, CISM
Manager of OutLink Security
Jack Henry & Associates, Inc.
7800 Willowchase Blvd.
Houston, TX.  77070
     voice              281.517.8000
     external fax       281.517.8157
     internal ext       471800




NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively for the individual or entity to which it is addressed. The 
message, together with any attachment, may contain confidential and/or 
privileged information. Any unauthorized review, use, printing, saving, 
copying, disclosure or distribution is strictly prohibited. If you have 
received this message in error, please immediately advise the sender by reply 
email and delete all copies.




As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.