Security Management Guide (G06.24+, H06.03+)

Index
Security Management Guide522283-008
Index-2
D
CLEARONPURGE
for sensitive files 8-5
setting with ALTER DISKFILE 3-16
setting with FUP 5-14
setting with SAFECOM 5-15
Command files 3-17
Configuration
for logon attempts 3-8
for subvolume security 3-16
of passwords 3-9
Converting the USERID file 3-2
Critical disk files, securing 3-14
Critical processes, securing 3-15
D
Data files 3-14
Default
file security 4-7, 5-13
protection
for Guardian files 3-7
for OSS files 4-7, 5-22
security 5-11
security string 2-10
DEFAULT command 5-12
DEFAULT-PROTECTION attribute 3-7,
3-22
DELUSER program, removing 3-2
DENY for access control lists 3-12
Detecting orphan files 2-11
Devices, controlling with PUP 2-20
Dial-up facilities
security for 5-20, 7-11
selecting users for 7-13
validating authorized users 8-3
Disk files, critical 3-14
DIVER program and licensing 2-9
DSAP command
detecting orphan files with 2-11
example of 2-11
identifying file ownership with 7-6
E
Educating users 1-1
Effective group ID 4-7
Effective user ID 4-7
Electronic mail 5-16, 5-17
Emergencies requiring the super ID 2-22
EMS Message 2-17
Encryption
of passwords 3-9
of sensitive data 7-17
Event-exit process 6-1
EXECUTE authority 5-10
F
File group 4-2, 4-6, 5-21
File names and Trojan horses 5-18
File ownership
for system files 2-9
Guardian 5-11
OSS 4-6
transferring 4-6, 5-11
File security
default 5-13
displaying
with FILEINFO 5-11
with ls command 5-20
displaying with ls command 4-6
Guardian 5-9
knowledge of 8-5
OSS 4-3, 4-7
FILEINFO command and security
setting 5-9
File-sharing groups
defined 3-11
displaying members 5-9
managing 7-2
find command 7-6
Freezing user IDs 3-10