Safeguard Administrator's Manual (G06.24+, H06.03+)
Table Of Contents
- What’s New in This Manual
- About This Manual
- 1 Introduction
- 2 Controlling User Access
- Introduction
- Using SAFECOM to Establish a Local User Community
- Using SAFECOM to Manage User Access to Your System
- Changing the Owner of a User Authentication Record
- Granting a User Temporary Access to Your System
- Requiring Users to Change Their Passwords
- Granting a Grace Period for Changing an Expired Password
- Forcing Immediate Expiration of a User’s Password
- Freezing a User's Ability to Access the System
- Specifying Auditing for a User ID
- Deleting Users
- Deleting Administrative Groups
- Using SAFECOM to Establish a Network of Users
- Using Safeguard With Nodes With Standard Security
- Identifying Network Users
- Granting a Network User Access to Objects on Your System
- Establishing a Community of Network Users
- Changes to the PAID During a User’s Session
- Additional Considerations for Aliases and Groups
- Additional Considerations for ACCESS with Network Specific Subject IDs
- Establishing Default Protection for a User's Disk Files
- Specifying a Default Command Interpreter for a User
- Establishing Guardian Defaults
- Assigning an Alias to a User
- 3 Managing User Groups
- 4 Securing Volumes and Devices
- 5 OBJECTTYPE Control
- 6 Managing Security Groups
- 7 Securing Terminals
- 8 Warning Mode
- 9 Configuration
- Safeguard Attributes
- Configuring User Authentication
- Configuring Password Control
- Configuring Device Control
- Configuring Process Control
- Configuring Disk-File Control
- Configuring Safeguard Auditing
- Configuring a Default Command Interpreter
- Configuring Communication With $CMON
- Configuring Logon Dialog
- Configuring Exclusive Access at Safeguard Terminals
- Configuring Warning Mode
- Configuring Persistence
- Configuring Attributes for Node Specific Subjects in ACLs
- 10 Installation and Management
- Safeguard Components
- Process Considerations for the SMP and SAFECOM
- Safeguard Subsystem Management Commands
- General Installation Procedure
- Installing the Safeguard Software
- Starting the SMP
- Converting to the Safeguard Subsystem
- Updating the Safeguard Software
- Guidelines for Securing the Safeguard Subsystem
- Monitoring the Safeguard Subsystem
- A SAFECOM Command Syntax
- Index
Configuration
Safeguard Administrator’s Manual—523317-013
9-16
Configuring Process Auditing
Configuring Process Auditing
You can configure systemwide auditing of all process names in addition to the audit
settings in the individual process authorization records. Processes can be audited at
the local level, at the remote level, or at both levels (ALL).
These Safeguard attributes relate to auditing processes:
AUDIT-PROCESS-ACCESS-PASS
Successful attempts to access all processes or subprocesses on the system are
audited. This setting supplements the audit settings for individual processes or
subprocesses. The conditions can be ALL, NONE, LOCAL, or REMOTE. The
default is NONE.
AUDIT-PROCESS-ACCESS-FAIL
Unsuccessful attempts to access all processes or subprocesses on the system are
audited. This setting supplements the audit settings for individual processes or
subprocesses. The conditions can be ALL, NONE, LOCAL, or REMOTE. The
default is NONE.
AUDIT-PROCESS-MANAGE-PASS
Successful attempts to create or manage the authorization record for a process or
subprocess are audited. This setting supplements the audit settings for individual
processes or subprocesses. The conditions can be ALL, NONE, LOCAL, or
REMOTE. The default is NONE.
AUDIT-PROCESS-MANAGE-FAIL
Unsuccessful attempts to create or manage the authorization record for a process
or subprocess are audited. This setting supplements the audit settings for
individual processes or subprocesses. The conditions can be ALL, NONE, LOCAL,
or REMOTE. The default is NONE.
To change any of these values, issue the ALTER SAFEGUARD command from
SAFECOM. For example, to specify auditing of all successful attempts to access a
process or subprocess, in addition to the audit settings in the individual process or
subprocess authorization records:
=ALTER SAFEGUARD, AUDIT-PROCESS-ACCESS-PASS ALL
Configuring Disk File Auditing
You can configure systemwide auditing of all disk volumes, subvolumes, and files in
addition to the audit settings in the individual volume, subvolume, and disk-file
authorization records. These objects can be audited at the local level, at the remote
level, or at both levels (ALL).
These Safeguard attributes relate to auditing disk files: