Safeguard Administrator's Manual (G06.24+, H06.03+)

Table Of Contents
Configuration
Safeguard Administrator’s Manual523317-013
9-13
Configuring Safeguard Auditing
LAST
specify that pattern searching will occur after the normal search if and only if
the normal search result is NORECORD.
ONLY
specifies that only pattern searching will occur. That is, normal non-pattern
searching will not be performed even if the pattern search returns
NORECORD.
To change any of these values, issue the ALTER SAFEGUARD command from
SAFECOM. For example, to check access control lists at the volume, subvolume, and
disk file levels, issue this command:
=ALTER SAFEGUARD, CHECK-DISKFILE ON, CHECK-VOLUME ON, &
=CHECK-SUBVOLUME ON
This command specifies that the Safeguard software is to use the first access control
list it finds in this following order—disk file, subvolume, volume:
=ALTER SAFEGUARD, COMBINATION-DISKFILE FIRST-ACL, &
=DIRECTION-DISKFILE DISKFILE-FIRST
Configuring Safeguard Auditing
Normally, the Safeguard software audits only items that have auditing specified in their
protection records. However, you can configure systemwide auditing so that auditing is
performed even if it is not specified in individual protection records. You can configure
Safeguard auditing:
All attempts relating to user authentication
All devices and their authorization records
All processes and their authorization records
All disk files and their authorization records
Caution. Any user can add a diskfile-pattern to the database and thereby is able to control file
access across an entire volume. If the CHECK-DISKFILE-PATTERN FIRST/LAST/ONLY
configuration is needed, use the ADD OBJECTTYPE DISKFILE-PATTERN command to specify
who can control diskfile-patterns. For more information, see Section 5, OBJECTTYPE Control
.
Caution. If you set CHECK-SUBVOLUME ON and set DIRECTION-DISKFILE to
VOLUME-FIRST, any user can gain access to someone else's files. All files that are in
subvolumes that have not been added to the Safeguard database are vulnerable. This situation
occurs because any user can add the subvolume to the database and thereby own it. If this
configuration is needed, use the ADD OBJECTTYPE or ALTER OBJECTTYPE command to
specify who can control subvolumes. For more information, see Section 5, OBJECTTYPE
Control.