Security Management Guide (G06.29+, H06.08+, J06.03+)

Index
Security Management Guide 522283-021
Index - 2
D
setting with FUP 7-14
setting with SAFECOM 7-15
Command files 3-18
Configuration
for logon attempts 3-8
for subvolume security 3-16
of passwords 3-9
Converting the USERID file 3-2
Critical disk files, securing 3-14
Critical processes, securing 3-15
D
Data files 3-15
Default
file security 4-7, 7-13
protection for OSS files 4-7
security 7-11
security string 2-9
DEFAULT command 7-12
Default protection
for Guardian files 3-8
for OSS files 7-22
DEFAULT-PROTECTION attribute 3-8,
3-21
DELUSER program, removing 3-2
DENY for access control lists 3-12
Detecting orphan files 2-10
Devices, controlling with PUP 2-22
Dial-up facilities
security for 6-15, 7-20
selecting users for 6-16
validating authorized users 8-3
Disk files, critical 3-14
DSAP command
detecting orphan files with 2-10
example of 2-11
identifying file ownership with 6-7
E
Educating users 1-1
Effective group ID 4-10
Effective user ID 4-10
Electronic mail 7-16, 7-17
Emergencies requiring the super ID 2-24
EMS Message 2-18
Encryption
of passwords 3-9
of sensitive data 6-20
Event-exit process 5-1
EXECUTE authority 7-10
F
File group 4-2, 4-6, 7-21
File names and Trojan horses 7-18
File ownership
for system files 2-8
Guardian 7-11
OSS 4-6
transferring 4-7, 7-11
File Privilege 4-7
File security
default 7-13
displaying with FILEINFO 7-11
displaying with ls command 4-6, 7-20
Guardian 7-9
knowledge of 8-5
OSS 4-3, 4-7
FILEINFO command and security
setting
7-9
File-sharing groups
defined
3-11
displaying members 7-9
managing 6-2
find command 6-6
FUP
and licensing 2-9
using to reassign orphan files 2-11
FUP SECURE command 7-11