HP SENTRY Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Software HP SENTRY. HP Sentry User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - Fitzgerald & Long

SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 800

Strany 2

Introduction - 6 SENTRY User’s Guide Fitzgerald & Long 6. Notice a file named "install". This is a script which will perform the

Strany 3 - Table Of Contents

Section 4 - 10 SENTRY User’s Guide Fitzgerald & Long 4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted li

Strany 4

SENTRY User’s Guide Section 4 - 11 Fitzgerald & Long 4.5 UPDATE PROTECTED COMMANDS UPDATE.VOC Command Update

Strany 6

SENTRY User’s Guide Appendix 1 - 1 Fitzgerald & Long APPENDIX 1 SENTRY INTERNAL SUBROUTINES NOTICE The subroutines documented in this appe

Strany 7 - USING THE SCREENS

Appendix 1 - 2 SENTRY User’s Guide Fitzgerald & Long This is the result of the encryption. If the data string is already encrypted and the e

Strany 8 - Data Entry Conventions

SENTRY User’s Guide Appendix 1 - 3 Fitzgerald & Long WRITE CRYPT.DATA ON FILE.VAR, REC.KEY DISPLAY.DECRYPTED SENTRY.ENCRYPT

Strany 9 - INSTALLING SENTRY

Appendix 1 - 4 SENTRY User’s Guide Fitzgerald & Long ERROR.TEXT = “””” CALL @SENTRY.USER.ITEM.CONTROL(USER.ITEM, ITEM. FOUND, ACCESS.RI

Strany 10

SENTRY User’s Guide Appendix 1 - 5 Fitzgerald & Long If an error was encountered by the subroutine, an error message will be returned. If no

Strany 11

Appendix 1 - 6 SENTRY User’s Guide Fitzgerald & Long Subroutine: SENTRY.VIOLATION.STAMP SENTRY.VIOLATION.STAMP is used to log access violat

Strany 12 - GETTING STARTED

SENTRY User’s Guide Appendix 1 - 7 Fitzgerald & Long

Strany 13

SENTRY User’s Guide Introduction - 7 Fitzgerald & Long SENTRY Main Menu 07 AUG 2000 1

Strany 15

SENTRY User’s Guide Appendix 2 - 1 Fitzgerald & Long APPENDIX 2 SENTRY KEY BINDINGS A record called "KEY.BINDINGS" in the SENTRY

Strany 16 - INTRODUCING THE MAIN MENU

Appendix 2 - 2 SENTRY User’s Guide Fitzgerald & Long environment and reenter SENTRY in order for the changes to take effect because these var

Strany 17

SENTRY User’s Guide Appendix 2 - 3 Fitzgerald & Long

Strany 18

Introduction - 8 SENTRY User’s Guide Fitzgerald & Long GETTING STARTED This section describes how to invoke the SENTRY Main Menu. It also d

Strany 19 - AND VALIDATION MENU

SENTRY User’s Guide Introduction - 9 Fitzgerald & Long Our recommendation is that you create a userid called sentry with the UID of 0 (zero).

Strany 20

Introduction - 10 SENTRY User’s Guide Fitzgerald & Long This is a safety precaution. SENTRY is a very powerful tool and should only be used

Strany 21

SENTRY User’s Guide Introduction - 11 Fitzgerald & Long wish to send the report to a specific printer, form or destination use the SETPTR com

Strany 22

Introduction - 12 SENTRY User’s Guide Fitzgerald & Long INTRODUCING THE MAIN MENU SENTRY'S Main Menu follows the copyright screen and t

Strany 23

SENTRY User’s Guide Introduction - 13 Fitzgerald & Long The first selection, Database Creation and Validation Menu offers access to programs

Strany 25

SENTRY User’s Guide Section 1 - 1 Fitzgerald & Long 1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SE

Strany 26

NOTICE The information contained in this guide is subject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical o

Strany 27

Section 1 - 2 SENTRY User’s Guide Fitzgerald & Long 1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SEN

Strany 28

SENTRY User’s Guide Section 1 - 3 Fitzgerald & Long

Strany 29

Section 1 - 4 SENTRY User’s Guide Fitzgerald & Long 1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX This program loads the data from the UNIX

Strany 30

SENTRY User’s Guide Section 1 - 5 Fitzgerald & Long We recommend: Upload the passwd and group files into the SENTRY databases on a regular b

Strany 31 - MAINTENANCE MENU

Section 1 - 6 SENTRY User’s Guide Fitzgerald & Long 1.2 CREATE DATABASE FROM FILE SYSTEM This section describes the program which create th

Strany 32 - 2.0 DATABASE MAINTENANCE

SENTRY User’s Guide Section 1 - 7 Fitzgerald & Long 1.3 VALIDATE THE USER PROFILE DATABASE This program is used to check the consistency of

Strany 33

Section 1 - 8 SENTRY User’s Guide Fitzgerald & Long This program will generate a printed report, using whatever printer setup is in effect at

Strany 34

SENTRY User’s Guide Section 1 - 9 Fitzgerald & Long 3. “Password for User XXXXX is less than N characters.” - The user “XXXXX” has a pas

Strany 35

Section 1 - 10 SENTRY User’s Guide Fitzgerald & Long 5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX” is the reg

Strany 36

SENTRY User’s Guide Section 1 - 11 Fitzgerald & Long

Strany 37

Table Of Contents USING THIS GUIDE---------------------------------------------------------------------------------------- Intro - 1 USING THE SCREENS

Strany 39

SENTRY User’s Guide Section 2 - 1 Fitzgerald & Long 2. INTRODUCING THE DATABASE MAINTENANCE MENU The second selection on SENTRY's

Strany 40 - 2.2 USER MAINTENANCE

Section 2 - 2 SENTRY User’s Guide Fitzgerald & Long 2.0 DATABASE MAINTENANCE This is the second sub-menu accessible from SENTRY’s Main Menu

Strany 41

SENTRY User’s Guide Section 2 - 3 Fitzgerald & Long 4. File System. This entry allows you to scroll through your UNIX tree structure much

Strany 42

Section 2 - 4 SENTRY User’s Guide Fitzgerald & Long 2.1 SYSTEM PROFILE MAINTENANCE This data entry program is used to display and change th

Strany 43

SENTRY User’s Guide Section 2 - 5 Fitzgerald & Long 1. Null Passwords Allowed - The default of this field is “N”. When set to “N”o, each

Strany 44

Section 2 - 6 SENTRY User’s Guide Fitzgerald & Long • Each password must contain at least two alphabetic characters and at least one numeric

Strany 45

SENTRY User’s Guide Section 2 - 7 Fitzgerald & Long However, we recommend using UIDs smaller than 5 digits simply to make them easier to read

Strany 46

Section 2 - 8 SENTRY User’s Guide Fitzgerald & Long Note that the indexing occurs at the time that the “Create Database from File System” pro

Strany 47

SENTRY User’s Guide Section 2 - 9 Fitzgerald & Long 1. Minimum password change (days): Enter the number of days before a user is allowed to

Strany 49

Section 2 - 10 SENTRY User’s Guide Fitzgerald & Long 2.2 USER MAINTENANCE This data entry program is used to display, change, and delete us

Strany 50

SENTRY User’s Guide Section 2 - 11 Fitzgerald & Long SENTRY database using the user’s name, enter “@” followed by the first or last name of t

Strany 51

Section 2 - 12 SENTRY User’s Guide Fitzgerald & Long configured (through the System Profile screen) to generate alphanumeric passwords, which

Strany 52

SENTRY User’s Guide Section 2 - 13 Fitzgerald & Long 8. Command - This field normally defines the startup UNIX shell the user invokes. The

Strany 53 - 2.4 FILE SYSTEM

Section 2 - 14 SENTRY User’s Guide Fitzgerald & Long new password for 90 days before he was forced by UNIX to enter a new password. This is

Strany 54

SENTRY User’s Guide Section 2 - 15 Fitzgerald & Long To exit you must save your changes by entering “F”. If you make no changes or wish to ca

Strany 55

Section 2 - 16 SENTRY User’s Guide Fitzgerald & Long /jaf Enter "<ESC>" to quit : Figure 17 - This is an example of

Strany 56

SENTRY User’s Guide Section 2 - 17 Fitzgerald & Long D) Do not delete this user. This option allows the user to return to the main User M

Strany 57

Section 2 - 18 SENTRY User’s Guide Fitzgerald & Long 2.3 GROUP MAINTENANCE Through this data entry program you may add and delete groups fr

Strany 58 - ACLs Maintenance

SENTRY User’s Guide Section 2 - 19 Fitzgerald & Long 2. GID - This is the number assigned to this group name. You may use “@” for a list of

Strany 59

SENTRY User’s Guide Introduction - 1 Fitzgerald & Long USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of

Strany 60

Section 2 - 20 SENTRY User’s Guide Fitzgerald & Long In UNIX every file has an owner and a group. The references to owners and groups are th

Strany 61 - More File Manager Views

SENTRY User’s Guide Section 2 - 21 Fitzgerald & Long GROUP.MAINT Group Maintenance 08/14/00 Files o

Strany 62

Section 2 - 22 SENTRY User’s Guide Fitzgerald & Long D) Do not delete this group. This option allows the user to return to the main Group M

Strany 63

SENTRY User’s Guide Section 2 - 23 Fitzgerald & Long 2.4 FILE SYSTEM With this program you may change owners, groups and the permissions fo

Strany 64 - 2.5 COMMAND MAINTENANCE

Section 2 - 24 SENTRY User’s Guide Fitzgerald & Long FILE.MANAGER General File Utility 16:24:02 07 AUG 2000 CURSOR.

Strany 65

SENTRY User’s Guide Section 2 - 25 Fitzgerald & Long One of the most valuable functions of this program is the ability to find files and dire

Strany 66

Section 2 - 26 SENTRY User’s Guide Fitzgerald & Long FILE.MAINT Detailed File View 08/08/00 File

Strany 67

SENTRY User’s Guide Section 2 - 27 Fitzgerald & Long In the lower half of the screen the file owner, group and permissions are displayed. Yo

Strany 68

Section 2 - 28 SENTRY User’s Guide Fitzgerald & Long ACLs Maintenance Access Control Lists (ACLs) are an extension the standard UNIX file pe

Strany 69

SENTRY User’s Guide Section 2 - 29 Fitzgerald & Long This is an example of the “ACL Maintenance Screen”. Not all UNIX systems support ACLs.

Strany 70

Introduction - 2 SENTRY User’s Guide Fitzgerald & Long PI/open the command prompt is indicated by a colon “:” while for uniVerse the prompt i

Strany 71

Section 2 - 30 SENTRY User’s Guide Fitzgerald & Long

Strany 72

SENTRY User’s Guide Section 2 - 31 Fitzgerald & Long The next field “3. Permissions” consists of three sets of three permissions. In our ex

Strany 73 - 3. Reports Menu

Section 2 - 32 SENTRY User’s Guide Fitzgerald & Long the user is not the owner and not a member of the group associated with a file, the perm

Strany 74 - 3.0 REPORTS MENU

SENTRY User’s Guide Section 2 - 33 Fitzgerald & Long FILE.MANAGER General File Utility 14:39:56 18 AUG 2000

Strany 75

Section 2 - 34 SENTRY User’s Guide Fitzgerald & Long 2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniV

Strany 76 - 3.1 SYSTEM PROFILE REPORT

SENTRY User’s Guide Section 2 - 35 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Me

Strany 77

Section 2 - 36 SENTRY User’s Guide Fitzgerald & Long X - Execute from inside a program only UX - Both use at database prompt and from

Strany 78

SENTRY User’s Guide Section 2 - 37 Fitzgerald & Long Enter Field Number, "F"ile, "DEL"ete or <ESC> to Exit: - This

Strany 79

Section 2 - 38 SENTRY User’s Guide Fitzgerald & Long 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you

Strany 80

SENTRY User’s Guide Section 2 - 39 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Me

Strany 81 - 3.2 USER PROFILES

SENTRY User’s Guide Introduction - 3 Fitzgerald & Long USING THE SCREENS SENTRY data entry screens feature some very helpful functions. The

Strany 82

Section 2 - 40 SENTRY User’s Guide Fitzgerald & Long 5. Groups - This is a input window used to enter the groups associated with this User

Strany 83 - 3.3 GROUPS REPORT

SENTRY User’s Guide Section 2 - 41 Fitzgerald & Long To save changes you have made to the User Items, enter "F" to file. After fil

Strany 84

Section 2 - 42 SENTRY User’s Guide Fitzgerald & Long Enter Line # of Groups (or Users) (1-N), "A"dd, "F"orward or "B

Strany 85

SENTRY User’s Guide Section 3 - 1 Fitzgerald & Long 3. INTRODUCING THE REPORTS MENU The third selection on SENTRY's Main Menu is 3. Re

Strany 86

Section 3 - 2 SENTRY User’s Guide Fitzgerald & Long 3.0 REPORTS MENU This is the third submenu accessible from SENTRY's Main Menu. A

Strany 87

SENTRY User’s Guide Section 3 - 3 Fitzgerald & Long Selection five Command Protection, is the same information as selection four except the

Strany 88

Section 3 - 4 SENTRY User’s Guide Fitzgerald & Long 3.1 SYSTEM PROFILE REPORT Selection one, System Profile, generates a report detailing

Strany 89

SENTRY User’s Guide Section 3 - 5 Fitzgerald & Long Minimum Password Length - This is a UNIX defined parameter as well as one used by SENTRY

Strany 90

Section 3 - 6 SENTRY User’s Guide Fitzgerald & Long embedded numeric. The default and recommended value is ALPHA which will generate a strin

Strany 91 - 4. Utilities Menu

SENTRY User’s Guide Section 3 - 7 Fitzgerald & Long Maximum user ID Length - This field contains a number defining the maximum number of ch

Strany 92 - 4.0 UTILITIES MENU

Introduction - 4 SENTRY User’s Guide Fitzgerald & Long Data Entry Conventions Underscore/underline When awaiting data, the cursor is posit

Strany 93

Section 3 - 8 SENTRY User’s Guide Fitzgerald & Long Punct for File Indexing - SENTRY builds B-trees to provide rapid cross referencing into

Strany 94 - 4.1 VOC PROTECTION SETUP

SENTRY User’s Guide Section 3 - 9 Fitzgerald & Long 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for

Strany 95

Section 3 - 10 SENTRY User’s Guide Fitzgerald & Long UID - UNIX maintains a relationship between users and files by assigning ownership via

Strany 96

SENTRY User’s Guide Section 3 - 11 Fitzgerald & Long 3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all dat

Strany 97 - 4.3 PASSWORD CREATION

Section 3 - 12 SENTRY User’s Guide Fitzgerald & Long GID for Users - The users listed in this field are assigned this group in the passwd fi

Strany 98

SENTRY User’s Guide Section 3 - 13 Fitzgerald & Long 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your syste

Strany 99

Section 3 - 14 SENTRY User’s Guide Fitzgerald & Long Description - The description field is used for documentation and may be entered throug

Strany 100

SENTRY User’s Guide Section 3 - 15 Fitzgerald & Long 3.5 COMMAND PROTECTION REPORT The SENTRY Command Protection Report presents an alphabe

Strany 101

Section 3 - 16 SENTRY User’s Guide Fitzgerald & Long Group Name & Rights - This field displays the names of groups (if any) used to defi

Strany 102

SENTRY User’s Guide Section 3 - 17 Fitzgerald & Long 3.6 ACCESS VIOLATIONS REPORT The SENTRY Access Violations Report is an audit report of

Strany 103 - APPENDIX 1

SENTRY User’s Guide Introduction - 5 Fitzgerald & Long INSTALLING SENTRY Installing the SENTRY software is very simple! Just follow these ea

Strany 104 - DATA ENCRYPTION

Section 3 - 18 SENTRY User’s Guide Fitzgerald & Long Pathname - This is the pathname to the account containing the protected VOC item which w

Strany 105

SENTRY User’s Guide Section 4 - 1 Fitzgerald & Long 4. INTRODUCING THE UTILITIES MENU The Utilities Menu is executed through selection four

Strany 106

Section 4 - 2 SENTRY User’s Guide Fitzgerald & Long 4.0 UTILITIES MENU This menu provides access to five utility programs designed to save

Strany 107 - ERROR.TEXT will be null

SENTRY User’s Guide Section 4 - 3 Fitzgerald & Long Selection four, Rebuild SENTRY Cross Reference Files. Sentry maintains a number of trad

Strany 108

Section 4 - 4 SENTRY User’s Guide Fitzgerald & Long 4.1 VOC PROTECTION SETUP This program provides the convenience of being able to copy th

Strany 109

SENTRY User’s Guide Section 4 - 5 Fitzgerald & Long 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively

Strany 110

Section 4 - 6 SENTRY User’s Guide Fitzgerald & Long This program is constructing a query sentence to SELECT the items to be purged. When ent

Strany 111 - APPENDIX 2

SENTRY User’s Guide Section 4 - 7 Fitzgerald & Long 4.3 PASSWORD CREATION This program provides a convenient utility to assist you in creat

Strany 112

Section 4 - 8 SENTRY User’s Guide Fitzgerald & Long MM/DD/YY. Sentry will select all users whose password update date is earlier than this d

Strany 113

SENTRY User’s Guide Section 4 - 9 Fitzgerald & Long 4. Department - If you have entered data into the “department” field of the SENTRY.USERS

Komentáře k této Příručce

Žádné komentáře