HP SENTRY Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie HP SENTRY. HP Sentry User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Fitzgerald & Long

SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 800

Strona 2

Introduction - 6 SENTRY User’s Guide Fitzgerald & Long 6. Notice a file named "install". This is a script which will perform the

Strona 3 - Table Of Contents

Section 4 - 10 SENTRY User’s Guide Fitzgerald & Long 4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted li

Strona 4

SENTRY User’s Guide Section 4 - 11 Fitzgerald & Long 4.5 UPDATE PROTECTED COMMANDS UPDATE.VOC Command Update

Strona 6

SENTRY User’s Guide Appendix 1 - 1 Fitzgerald & Long APPENDIX 1 SENTRY INTERNAL SUBROUTINES NOTICE The subroutines documented in this appe

Strona 7 - USING THE SCREENS

Appendix 1 - 2 SENTRY User’s Guide Fitzgerald & Long This is the result of the encryption. If the data string is already encrypted and the e

Strona 8 - Data Entry Conventions

SENTRY User’s Guide Appendix 1 - 3 Fitzgerald & Long WRITE CRYPT.DATA ON FILE.VAR, REC.KEY DISPLAY.DECRYPTED SENTRY.ENCRYPT

Strona 9 - INSTALLING SENTRY

Appendix 1 - 4 SENTRY User’s Guide Fitzgerald & Long ERROR.TEXT = “””” CALL @SENTRY.USER.ITEM.CONTROL(USER.ITEM, ITEM. FOUND, ACCESS.RI

Strona 10

SENTRY User’s Guide Appendix 1 - 5 Fitzgerald & Long If an error was encountered by the subroutine, an error message will be returned. If no

Strona 11

Appendix 1 - 6 SENTRY User’s Guide Fitzgerald & Long Subroutine: SENTRY.VIOLATION.STAMP SENTRY.VIOLATION.STAMP is used to log access violat

Strona 12 - GETTING STARTED

SENTRY User’s Guide Appendix 1 - 7 Fitzgerald & Long

Strona 13

SENTRY User’s Guide Introduction - 7 Fitzgerald & Long SENTRY Main Menu 07 AUG 2000 1

Strona 15

SENTRY User’s Guide Appendix 2 - 1 Fitzgerald & Long APPENDIX 2 SENTRY KEY BINDINGS A record called "KEY.BINDINGS" in the SENTRY

Strona 16 - INTRODUCING THE MAIN MENU

Appendix 2 - 2 SENTRY User’s Guide Fitzgerald & Long environment and reenter SENTRY in order for the changes to take effect because these var

Strona 17

SENTRY User’s Guide Appendix 2 - 3 Fitzgerald & Long

Strona 18

Introduction - 8 SENTRY User’s Guide Fitzgerald & Long GETTING STARTED This section describes how to invoke the SENTRY Main Menu. It also d

Strona 19 - AND VALIDATION MENU

SENTRY User’s Guide Introduction - 9 Fitzgerald & Long Our recommendation is that you create a userid called sentry with the UID of 0 (zero).

Strona 20

Introduction - 10 SENTRY User’s Guide Fitzgerald & Long This is a safety precaution. SENTRY is a very powerful tool and should only be used

Strona 21

SENTRY User’s Guide Introduction - 11 Fitzgerald & Long wish to send the report to a specific printer, form or destination use the SETPTR com

Strona 22

Introduction - 12 SENTRY User’s Guide Fitzgerald & Long INTRODUCING THE MAIN MENU SENTRY'S Main Menu follows the copyright screen and t

Strona 23

SENTRY User’s Guide Introduction - 13 Fitzgerald & Long The first selection, Database Creation and Validation Menu offers access to programs

Strona 25

SENTRY User’s Guide Section 1 - 1 Fitzgerald & Long 1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SE

Strona 26

NOTICE The information contained in this guide is subject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical o

Strona 27

Section 1 - 2 SENTRY User’s Guide Fitzgerald & Long 1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SEN

Strona 28

SENTRY User’s Guide Section 1 - 3 Fitzgerald & Long

Strona 29

Section 1 - 4 SENTRY User’s Guide Fitzgerald & Long 1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX This program loads the data from the UNIX

Strona 30

SENTRY User’s Guide Section 1 - 5 Fitzgerald & Long We recommend: Upload the passwd and group files into the SENTRY databases on a regular b

Strona 31 - MAINTENANCE MENU

Section 1 - 6 SENTRY User’s Guide Fitzgerald & Long 1.2 CREATE DATABASE FROM FILE SYSTEM This section describes the program which create th

Strona 32 - 2.0 DATABASE MAINTENANCE

SENTRY User’s Guide Section 1 - 7 Fitzgerald & Long 1.3 VALIDATE THE USER PROFILE DATABASE This program is used to check the consistency of

Strona 33

Section 1 - 8 SENTRY User’s Guide Fitzgerald & Long This program will generate a printed report, using whatever printer setup is in effect at

Strona 34

SENTRY User’s Guide Section 1 - 9 Fitzgerald & Long 3. “Password for User XXXXX is less than N characters.” - The user “XXXXX” has a pas

Strona 35

Section 1 - 10 SENTRY User’s Guide Fitzgerald & Long 5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX” is the reg

Strona 36

SENTRY User’s Guide Section 1 - 11 Fitzgerald & Long

Strona 37

Table Of Contents USING THIS GUIDE---------------------------------------------------------------------------------------- Intro - 1 USING THE SCREENS

Strona 39

SENTRY User’s Guide Section 2 - 1 Fitzgerald & Long 2. INTRODUCING THE DATABASE MAINTENANCE MENU The second selection on SENTRY's

Strona 40 - 2.2 USER MAINTENANCE

Section 2 - 2 SENTRY User’s Guide Fitzgerald & Long 2.0 DATABASE MAINTENANCE This is the second sub-menu accessible from SENTRY’s Main Menu

Strona 41

SENTRY User’s Guide Section 2 - 3 Fitzgerald & Long 4. File System. This entry allows you to scroll through your UNIX tree structure much

Strona 42

Section 2 - 4 SENTRY User’s Guide Fitzgerald & Long 2.1 SYSTEM PROFILE MAINTENANCE This data entry program is used to display and change th

Strona 43

SENTRY User’s Guide Section 2 - 5 Fitzgerald & Long 1. Null Passwords Allowed - The default of this field is “N”. When set to “N”o, each

Strona 44

Section 2 - 6 SENTRY User’s Guide Fitzgerald & Long • Each password must contain at least two alphabetic characters and at least one numeric

Strona 45

SENTRY User’s Guide Section 2 - 7 Fitzgerald & Long However, we recommend using UIDs smaller than 5 digits simply to make them easier to read

Strona 46

Section 2 - 8 SENTRY User’s Guide Fitzgerald & Long Note that the indexing occurs at the time that the “Create Database from File System” pro

Strona 47

SENTRY User’s Guide Section 2 - 9 Fitzgerald & Long 1. Minimum password change (days): Enter the number of days before a user is allowed to

Strona 49

Section 2 - 10 SENTRY User’s Guide Fitzgerald & Long 2.2 USER MAINTENANCE This data entry program is used to display, change, and delete us

Strona 50

SENTRY User’s Guide Section 2 - 11 Fitzgerald & Long SENTRY database using the user’s name, enter “@” followed by the first or last name of t

Strona 51

Section 2 - 12 SENTRY User’s Guide Fitzgerald & Long configured (through the System Profile screen) to generate alphanumeric passwords, which

Strona 52

SENTRY User’s Guide Section 2 - 13 Fitzgerald & Long 8. Command - This field normally defines the startup UNIX shell the user invokes. The

Strona 53 - 2.4 FILE SYSTEM

Section 2 - 14 SENTRY User’s Guide Fitzgerald & Long new password for 90 days before he was forced by UNIX to enter a new password. This is

Strona 54

SENTRY User’s Guide Section 2 - 15 Fitzgerald & Long To exit you must save your changes by entering “F”. If you make no changes or wish to ca

Strona 55

Section 2 - 16 SENTRY User’s Guide Fitzgerald & Long /jaf Enter "<ESC>" to quit : Figure 17 - This is an example of

Strona 56

SENTRY User’s Guide Section 2 - 17 Fitzgerald & Long D) Do not delete this user. This option allows the user to return to the main User M

Strona 57

Section 2 - 18 SENTRY User’s Guide Fitzgerald & Long 2.3 GROUP MAINTENANCE Through this data entry program you may add and delete groups fr

Strona 58 - ACLs Maintenance

SENTRY User’s Guide Section 2 - 19 Fitzgerald & Long 2. GID - This is the number assigned to this group name. You may use “@” for a list of

Strona 59

SENTRY User’s Guide Introduction - 1 Fitzgerald & Long USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of

Strona 60

Section 2 - 20 SENTRY User’s Guide Fitzgerald & Long In UNIX every file has an owner and a group. The references to owners and groups are th

Strona 61 - More File Manager Views

SENTRY User’s Guide Section 2 - 21 Fitzgerald & Long GROUP.MAINT Group Maintenance 08/14/00 Files o

Strona 62

Section 2 - 22 SENTRY User’s Guide Fitzgerald & Long D) Do not delete this group. This option allows the user to return to the main Group M

Strona 63

SENTRY User’s Guide Section 2 - 23 Fitzgerald & Long 2.4 FILE SYSTEM With this program you may change owners, groups and the permissions fo

Strona 64 - 2.5 COMMAND MAINTENANCE

Section 2 - 24 SENTRY User’s Guide Fitzgerald & Long FILE.MANAGER General File Utility 16:24:02 07 AUG 2000 CURSOR.

Strona 65

SENTRY User’s Guide Section 2 - 25 Fitzgerald & Long One of the most valuable functions of this program is the ability to find files and dire

Strona 66

Section 2 - 26 SENTRY User’s Guide Fitzgerald & Long FILE.MAINT Detailed File View 08/08/00 File

Strona 67

SENTRY User’s Guide Section 2 - 27 Fitzgerald & Long In the lower half of the screen the file owner, group and permissions are displayed. Yo

Strona 68

Section 2 - 28 SENTRY User’s Guide Fitzgerald & Long ACLs Maintenance Access Control Lists (ACLs) are an extension the standard UNIX file pe

Strona 69

SENTRY User’s Guide Section 2 - 29 Fitzgerald & Long This is an example of the “ACL Maintenance Screen”. Not all UNIX systems support ACLs.

Strona 70

Introduction - 2 SENTRY User’s Guide Fitzgerald & Long PI/open the command prompt is indicated by a colon “:” while for uniVerse the prompt i

Strona 71

Section 2 - 30 SENTRY User’s Guide Fitzgerald & Long

Strona 72

SENTRY User’s Guide Section 2 - 31 Fitzgerald & Long The next field “3. Permissions” consists of three sets of three permissions. In our ex

Strona 73 - 3. Reports Menu

Section 2 - 32 SENTRY User’s Guide Fitzgerald & Long the user is not the owner and not a member of the group associated with a file, the perm

Strona 74 - 3.0 REPORTS MENU

SENTRY User’s Guide Section 2 - 33 Fitzgerald & Long FILE.MANAGER General File Utility 14:39:56 18 AUG 2000

Strona 75

Section 2 - 34 SENTRY User’s Guide Fitzgerald & Long 2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniV

Strona 76 - 3.1 SYSTEM PROFILE REPORT

SENTRY User’s Guide Section 2 - 35 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Me

Strona 77

Section 2 - 36 SENTRY User’s Guide Fitzgerald & Long X - Execute from inside a program only UX - Both use at database prompt and from

Strona 78

SENTRY User’s Guide Section 2 - 37 Fitzgerald & Long Enter Field Number, "F"ile, "DEL"ete or <ESC> to Exit: - This

Strona 79

Section 2 - 38 SENTRY User’s Guide Fitzgerald & Long 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you

Strona 80

SENTRY User’s Guide Section 2 - 39 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Me

Strona 81 - 3.2 USER PROFILES

SENTRY User’s Guide Introduction - 3 Fitzgerald & Long USING THE SCREENS SENTRY data entry screens feature some very helpful functions. The

Strona 82

Section 2 - 40 SENTRY User’s Guide Fitzgerald & Long 5. Groups - This is a input window used to enter the groups associated with this User

Strona 83 - 3.3 GROUPS REPORT

SENTRY User’s Guide Section 2 - 41 Fitzgerald & Long To save changes you have made to the User Items, enter "F" to file. After fil

Strona 84

Section 2 - 42 SENTRY User’s Guide Fitzgerald & Long Enter Line # of Groups (or Users) (1-N), "A"dd, "F"orward or "B

Strona 85

SENTRY User’s Guide Section 3 - 1 Fitzgerald & Long 3. INTRODUCING THE REPORTS MENU The third selection on SENTRY's Main Menu is 3. Re

Strona 86

Section 3 - 2 SENTRY User’s Guide Fitzgerald & Long 3.0 REPORTS MENU This is the third submenu accessible from SENTRY's Main Menu. A

Strona 87

SENTRY User’s Guide Section 3 - 3 Fitzgerald & Long Selection five Command Protection, is the same information as selection four except the

Strona 88

Section 3 - 4 SENTRY User’s Guide Fitzgerald & Long 3.1 SYSTEM PROFILE REPORT Selection one, System Profile, generates a report detailing

Strona 89

SENTRY User’s Guide Section 3 - 5 Fitzgerald & Long Minimum Password Length - This is a UNIX defined parameter as well as one used by SENTRY

Strona 90

Section 3 - 6 SENTRY User’s Guide Fitzgerald & Long embedded numeric. The default and recommended value is ALPHA which will generate a strin

Strona 91 - 4. Utilities Menu

SENTRY User’s Guide Section 3 - 7 Fitzgerald & Long Maximum user ID Length - This field contains a number defining the maximum number of ch

Strona 92 - 4.0 UTILITIES MENU

Introduction - 4 SENTRY User’s Guide Fitzgerald & Long Data Entry Conventions Underscore/underline When awaiting data, the cursor is posit

Strona 93

Section 3 - 8 SENTRY User’s Guide Fitzgerald & Long Punct for File Indexing - SENTRY builds B-trees to provide rapid cross referencing into

Strona 94 - 4.1 VOC PROTECTION SETUP

SENTRY User’s Guide Section 3 - 9 Fitzgerald & Long 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for

Strona 95

Section 3 - 10 SENTRY User’s Guide Fitzgerald & Long UID - UNIX maintains a relationship between users and files by assigning ownership via

Strona 96

SENTRY User’s Guide Section 3 - 11 Fitzgerald & Long 3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all dat

Strona 97 - 4.3 PASSWORD CREATION

Section 3 - 12 SENTRY User’s Guide Fitzgerald & Long GID for Users - The users listed in this field are assigned this group in the passwd fi

Strona 98

SENTRY User’s Guide Section 3 - 13 Fitzgerald & Long 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your syste

Strona 99

Section 3 - 14 SENTRY User’s Guide Fitzgerald & Long Description - The description field is used for documentation and may be entered throug

Strona 100

SENTRY User’s Guide Section 3 - 15 Fitzgerald & Long 3.5 COMMAND PROTECTION REPORT The SENTRY Command Protection Report presents an alphabe

Strona 101

Section 3 - 16 SENTRY User’s Guide Fitzgerald & Long Group Name & Rights - This field displays the names of groups (if any) used to defi

Strona 102

SENTRY User’s Guide Section 3 - 17 Fitzgerald & Long 3.6 ACCESS VIOLATIONS REPORT The SENTRY Access Violations Report is an audit report of

Strona 103 - APPENDIX 1

SENTRY User’s Guide Introduction - 5 Fitzgerald & Long INSTALLING SENTRY Installing the SENTRY software is very simple! Just follow these ea

Strona 104 - DATA ENCRYPTION

Section 3 - 18 SENTRY User’s Guide Fitzgerald & Long Pathname - This is the pathname to the account containing the protected VOC item which w

Strona 105

SENTRY User’s Guide Section 4 - 1 Fitzgerald & Long 4. INTRODUCING THE UTILITIES MENU The Utilities Menu is executed through selection four

Strona 106

Section 4 - 2 SENTRY User’s Guide Fitzgerald & Long 4.0 UTILITIES MENU This menu provides access to five utility programs designed to save

Strona 107 - ERROR.TEXT will be null

SENTRY User’s Guide Section 4 - 3 Fitzgerald & Long Selection four, Rebuild SENTRY Cross Reference Files. Sentry maintains a number of trad

Strona 108

Section 4 - 4 SENTRY User’s Guide Fitzgerald & Long 4.1 VOC PROTECTION SETUP This program provides the convenience of being able to copy th

Strona 109

SENTRY User’s Guide Section 4 - 5 Fitzgerald & Long 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively

Strona 110

Section 4 - 6 SENTRY User’s Guide Fitzgerald & Long This program is constructing a query sentence to SELECT the items to be purged. When ent

Strona 111 - APPENDIX 2

SENTRY User’s Guide Section 4 - 7 Fitzgerald & Long 4.3 PASSWORD CREATION This program provides a convenient utility to assist you in creat

Strona 112

Section 4 - 8 SENTRY User’s Guide Fitzgerald & Long MM/DD/YY. Sentry will select all users whose password update date is earlier than this d

Strona 113

SENTRY User’s Guide Section 4 - 9 Fitzgerald & Long 4. Department - If you have entered data into the “department” field of the SENTRY.USERS

Komentarze do niniejszej Instrukcji

Brak uwag