HP OpenVMS Guide to System Security: OpenVMS Version 8.4
Index
Symbols- $AUDIT_EVENT system service, reporting
security-relevant events, Sources of Event Information
- $CHECK_ACCESS system service, security auditing and, Sources of Event Information
- $CHECK_PRIVILEGE
system service, reporting privilege use, Sources of Event Information
- $CHKPRO system service
- role in access control, How the System Determines if a User Can Access a Protected Object
- security auditing and, Sources of Event Information
- /ACCESS qualifier
in Authorize utility, Restricting Work Times
- /CLITABLES qualifier, Setting Up Captive Accounts, Restricting DCL Command Usage
- /EXPIRATION qualifier, Restricting Account Duration
- /FLAGS=CAPTIVE
qualifier, Setting Up Captive Accounts
- /FLAGS=DISIMAGE qualifier, Restricting DCL Command Usage
- /FLAGS=DISMAIL qualifier, New Mail Announcements
- /FLAGS=DISNEWMAIL
qualifier, New Mail Announcements
- /FLAGS=DISPWDDIC
qualifier, Screening New Passwords
- /FLAGS=DISPWDHIS qualifier, Screening New Passwords
- /FLAGS=DISRECONNECT qualifier, Limiting Disconnected Processes
- /FLAGS=DISREPORT
qualifier, Last Login Messages
- /FLAGS=DISUSER qualifier, Password Protection Checklist
- /FLAGS=DISWELCOME qualifier, Welcome Message
- /FLAGS=GENPWD
qualifier, Secondary Passwords, Generated Passwords
- /FLAGS=LOCKPWD qualifier, Generated Passwords
- /FLAGS=PWD_EXPIRED
qualifier, Expiring Passwords
- /FLAGS=RESTRICTED
qualifier, Restricted Accounts
- /LGICMD qualifier and captive accounts, Setting Up Captive Accounts
- /LOCAL_PASSWORD
qualifier, Overriding External Authentication
- /PRCLM qualifier in AUTHORIZE, Qualifiers Required to Define Captive Accounts
- /PRIMEDAYS qualifier, example, Restricting Work Times
- /PWDLIFETIME qualifier, Expiring Passwords
- /PWDMINIMUM qualifier, Requiring a Minimum Password Length
A- Access
- auditing of processes, Kinds of System Activity the Operating System Can Report
- BYPASS
privilege, How the System Determines if a User Can Access a Protected Object
- class-specific
overrides, How the System Determines if a User Can Access a Protected Object
- denying, Enhancing Protection for Sensitive Objects
- how the system determines, How the System Determines if a User Can Access a Protected Object
- object-oriented, Authorization Database Represented as an Access Matrix
- performance impact of auditing, Considering the Performance Impact
- privileges bypassing ACLs, How Privileges Affect Protection Mechanisms
- privileges
bypassing protection codes, How Privileges Affect Protection Mechanisms
- subject-oriented, Authorization Database Represented as an Access Matrix
- through ACLs, Granting Access to Particular Users
- through
GRPPRV privilege, How the System Determines if a User Can Access a Protected Object
- through protection codes, Protection Code
- through READALL privilege, How the System Determines if a User Can Access a Protected Object
- through
SYSPRV privilege, How the System Determines if a User Can Access a Protected Object
- to deleted file data, Accessibility of Data in a File
- Access categories, Controlling Access with Protection Codes
- Access control
- ACE order, importance of, Ordering ACEs Within a List
- assigning file defaults, Establishing an Inheritance Scheme for Files
- bypassing ACLs, Understanding Privileges and Control Access
- bypassing protection codes, Understanding Privileges and Control Access
- comparing security profiles, Contents of a User's Security Profile
- controlling in network environment, Setting Up a Proxy Database
- default application account, Hierarchy of Access Controls
- default for inbound connection, Using Default Application Accounts
- denying a class of users, Conditionalizing Identifiers for Different Users
- denying access through an ACL, Preventing Users from Accessing an Object
- evaluating a user's access request, How the System Determines if a User Can Access a Protected Object
- explicit, Hierarchy of Access Controls
- for a network, Hierarchy of Access Controls
- for applications, Using Default Application Accounts
- for connections, Hierarchy of Access Controls
- for protected objects, Protecting Data
- Identifier ACEs and, Granting Access to Particular Users
- in a network environment, Managing Network Security
- limited-access accounts, Assigning Appropriate Accounts to Users
- limiting access to an environment, Types of Identifiers, Limiting Access to an Environment
- limiting device access, Limiting Access to a Device
- limiting logins, Defining Times and Conditions for System Access
- matrix, Authorization Database Represented as an Access Matrix
- object security profiles, Security Profile of Objects
- object-specific considerations, Object-Specific Access Considerations
- protection code processing rules, How the System Determines if a User Can Access a Protected Object
- protection code user categories, Protection Code
- proxy, Hierarchy of Access Controls, Using Proxy Logins
- routing initialization
passwords, Specifying Routing Initialization Passwords
- through ACLs, Controlling Access with ACLs, Ordering ACEs Within a List
- using Identifier ACEs, Using Identifier Access Control Entries (ACEs), Establishing an Inheritance Scheme for Files
- using the NCP, Using Explicit Access Control
- with Identifier ACEs, Using Identifier Access Control Entries (ACEs), Establishing an Inheritance Scheme for Files
- Access control strings, Protecting Information in Access Control Strings, Using Explicit Access Control
- command procedures and, Protecting Information in Access Control Strings
- exposing password in, Guidelines for Protecting Your Password
- protecting information
in, Protecting Information in Access Control Strings
- secondary passwords with, Secondary Passwords
- Access requirements
- allocating devices, Access Requirements for I/O Operations
- capability object, Types of Access
- common event flag clusters, Types of Access
- directories, Access Requirements
- file-oriented devices, Access Requirements for I/O Operations
- files, Access Requirements
- global sections, Types of Access
- I/O channel, Access Requirements for I/O Operations
- logical name tables, Types of Access
- non-file-oriented devices, Access Requirements for I/O Operations
- queues, Types of Access
- resource domains, Types of Access
- security class objects, Types of Access
- shareable devices, Access Requirements for I/O Operations
- spooled devices, Access Requirements for I/O Operations
- unshareable devices, Access Requirements for I/O Operations
- volumes, Access Requirements for I/O Operations
- Access types
- abbreviations of, Format of a Protection Code
- ACLs, Establishing an Inheritance Scheme for Files
- associate, Types of Access
- capability class, Types of Access
- class-dependency
of, Types of Access in a Protection Code
- common event flag clusters, Types of Access
- control, Types of Access in a Protection Code, Types of Access
- files, Types of Access
- objects in general, Using Control Access to Modify an Object Profile
- create
- logical name tables, Types of Access
- volumes, Types of Access
- delete
- common event flag clusters, Types of Access
- files, Types of Access
- logical name tables, Types of Access
- queues, Types of Access
- volumes, Types of Access
- directories, Types of Access
- execute
- files, Types of Access
- global sections, Types of Access
- files, Types of Access
- global sections, Types of Access
- lock, Types of Access
- logical I/O, Types of Access
- logical name tables, Types of Access
- manage, Types of Access
- physical I/O, Types of Access
- protection
codes and, Format of a Protection Code, Types of Access in a Protection Code
- queues, Types of Access
- read
- devices, Types of Access
- files, Types of Access
- global sections, Types of Access
- logical name tables, Types of Access
- queues, Types of Access
- resource domains, Types of Access
- security class, Types of Access
- volumes, Types of Access
- resource domains, Types of Access
- security
audit and, Additional Events to Audit
- security class, Types of Access
- shared devices, Types of Access
- submit, Types of Access
- unshared devices, Types of Access
- volumes, Types of Access
- write
- devices, Types of Access
- files, Types of Access, Access Requirements
- global section, Types of Access
- logical name tables, Types of Access
- resource domains, Types of Access
- security class, Types of Access
- volumes, Types of Access
- Accounting logs
- as security tool, System Accounting
- Accounting
logs as security tool, System Accounting
- Accounts
- accessing after password expires, Changing an Expired Password
- application, Hierarchy of Access Controls
- auditing access, Auditing Access to Your Account and Files
- captive, Types of System Accounts
- DECNET account, removing, Removing Default DECnet Access to the System
- designing secure accounts, Training the New User, Assigning Appropriate Accounts to Users
- disabling with DISUSER flag, Disabling Accounts
- disguising
identity, Security Auditing
- expiration, Password and Account Expiration Times, Renewing an Expired Account
- first login, Obtaining Your Initial Password
- guest, Guest Accounts
- initial password, Obtaining Your Initial Password
- interactive, Types of System Accounts
- limited-access, Types of System Accounts
- network objects, Configuring Network Objects Manually
- open, Password Requirements for Different Types of Accounts
- password expiration and, Changing an Expired Password
- password requirements for, Password Requirements for Different Types of Accounts
- passwords
for multiple, Guidelines for Protecting Your Password
- privileged, Privileged Accounts
- project, Setting Defaults for a Directory Owned by a Resource Identifier, Setting Up the Directory of a Resource Identifier
- proxy, Proxy Accounts
- renewing expired, Renewing an Expired Account
- restricted, Password Requirements for Different Types of Accounts, Types of System Accounts
- secondary password, Types of Passwords
- setting duration of, Restricting Account Duration
- setting
up to use project identifiers, Setting Up the Resource Identifier
- types of, Password Requirements for Different Types of Accounts, Types of System Accounts
- user passwords for, Knowing What Type of Password to Use
- ACE
attributes
- Default, Establishing an Inheritance Scheme for Files
- Hidden, Displaying ACLs
- None, Preventing Users from Accessing an Object, Limiting Access to a Device
- Nopropagate, Copying an ACL, Restoring a File's Default Security Profile
- Protected, Deleting an ACL, Copying an ACL, Restoring a File's Default Security Profile
- ACEs (access control entries)
- adding, Adding ACEs to an Existing ACL
- Alarm ACEs, Adding Security-Auditing ACEs, Attaching a Security-Auditing ACE
- Audit ACEs, Adding Security-Auditing ACEs, Attaching a Security-Auditing ACE
- creating, Using Identifier Access Control Entries (ACEs)
- Creator ACEs, Rules for Assigning a Protection Code and ACL, Resource Attribute, Setting Up the ACL
- Default Protection
ACEs, Providing a Default Protection Code for a Directory Structure
- deleting, Deleting ACEs from an ACL
- generating audit event messages, Ways to Generate Audit Information
- inserting in a list, Adding ACEs to an Existing ACL
- order of, How the System Determines if a User Can Access a Protected Object, Ordering ACEs Within a List, Adding ACEs to an Existing ACL
- replacing, Replacing Part of an ACL
- security auditing, Adding ACEs to an Existing ACL
- sensitive files and, Adding Access Control Entries to Sensitive Files
- Subsystem ACEs, Customizing Identifiers
- subsystem ACEs, System Management Requirements, Building the Subsystem, Enabling Protected Subsystems on a Trusted Volume
- types of, Using Identifier Access Control Entries (ACEs)
- ACL editor
- displaying ACLs, Access Control List (ACL)
- modifying
ACLs, Adding ACEs to an Existing ACL
- ACLs (access control lists), Access Control List (ACL), Controlling Access with ACLs, Setting Defaults for a Directory Owned by a Resource Identifier
- ACE order, How the System Determines if a User Can Access a Protected Object, Ordering ACEs Within a List, Adding ACEs to an Existing ACL
- alarms generated by, Alarm Messages
- assigning by default to new files, Establishing an Inheritance Scheme for Files
- bypassing with special rights, Understanding Privileges and Control Access
- copying, Copying an ACL
- creating, Using Identifier Access Control Entries (ACEs)
- deleting, Deleting an ACL
- deleting obsolete identifiers, Removing Identifiers
- designing, Designing ACLs
- disadvantages of, Designing ACLs
- displaying, Access Control List (ACL), Displaying ACLs
- effect of
privileges, How the System Determines if a User Can Access a Protected Object
- effect on performance, Designing ACLs
- granting access, Granting Access to Particular Users
- interaction with protection codes, Enhancing Protection for Sensitive Objects
- management overview, Naming Individual Users in ACLs
- modifying, Adding ACEs to an Existing ACL
- network file sharing, Setting Up Accounts for Local and Remote Users
- priority in access evaluation, How the System Determines if a User Can Access a Protected Object
- protection codes and, Preventing Users from Accessing an Object
- queue access rights, Types of Access
- reordering entries, Adding ACEs to an Existing ACL
- replacing ACEs, Replacing Part of an ACL
- restoring default ACL, Restoring a File's Default ACL
- restoring file default, Restoring a File's Default Security Profile
- security element of an object, Contents of an Object's Profile
- setting file
protection, Controlling File Access, Setting Up the ACL
- system program files, Restricting DCL Command Usage
- ACME, ACME Subsystem Overview
- ACME agents, ACME Subsystem Overview
- ACME subsystem, Authentication and Credentials Management Extensions (ACME) Subsystem
- ACME_SERVER process, ACME Subsystem Overview
- ACNT
privilege, ACNT Privilege (Devour)
- ADD/IDENTIFIER
command in Authorize utility, Restoring the Rights Database
- ADD/PROXY command
in Authorize utility, Procedure for Creating a Proxy Account, Setting Up Accounts for Local and Remote Users
- AES Algorithm, Encryption Process
- Alarm ACEs, Adding Security-Auditing ACEs
- how
to use, Attaching a Security-Auditing ACE
- position
in ACL, Displaying ACLs
- Alarm
messages, Alarm Messages
- ACL event, Alarm Messages
- authorization database
modification, Alarm Messages
- break-in event, Alarm Messages
- INSTALL event, Alarm Messages
- login, Alarm Messages
- login failure, Alarm Messages
- logout, Alarm Messages
- network connection, Alarm Messages
- object access event, Alarm Messages
- object creation, Alarm Messages
- object deaccess, Alarm Messages
- object deletion, Alarm Messages
- privilege use, Alarm Messages
- process control event, Alarm Messages
- SET AUDIT use, Alarm Messages
- system parameter modification, Alarm Messages
- time modification, Alarm Messages
- volume mount/dismount, Alarm Messages
- Alarms
- enabling for security, Asking Your Security Administrator to Enable Auditing
- ALF (automatic login facility), Providing Automatic Login
- Autologin account as security problem, Automatic Login Accounts
- AUTOLOGIN flag, Automatic Login Accounts
- cluster requirements for ALF files, Synchronizing Authorization Data
- ALLSPOOL
privilege, ALLSPOOL Privilege (Devour)
- Alphanumeric UICs, Format of a UIC
- ALTPRI
privilege, ALTPRI Privilege (System)
- ANALYZE/AUDIT
command, Invoking the Audit Analysis Utility
- qualifier summary, Providing Report Specifications
- Announcement messages, Entering a System Password, Local Login Messages
- security disadvantages, Announcement Message
- APPEND command, /PROTECTION
qualifier, Adjusting Protection Defaults
- Applications, setting access control, Using Default Application Accounts
- Archive files
- analyzing security-relevant
events, Using a Remote Log File
- enabling remote, Using a Remote Log File
- for security event messages, Using a Remote Log File
- Archive flush, Adjusting the Transfer of Messages to Disk
- ASCII output
from Audit Analysis utility, Providing Report Specifications
- Associate access, Types of Access
- Asynchronous connection, dynamic, Establishing a Dynamic Asynchronous Connection
- Asynchronous
DDCMP driver, Establishing a Dynamic Asynchronous Connection
- Attacks,
types of system, Forms of System Attacks
- Audit
ACEs, Adding Security-Auditing ACEs
- how to use, Attaching a Security-Auditing ACE
- Audit Analysis utility (ANALYZE/AUDIT), Security Auditing, Using a Remote Log File, Examining the Report
- analyzing archive files, Using a Remote Log File
- ASCII output from, Providing Report Specifications
- binary output from, Providing Report Specifications
- determining criteria
of the analysis, Examining the Report
- example, Examining the Report
- generating daily reports, Recommended Procedure
- interactive commands, Using the Audit Analysis Utility Interactively
- invoking, Invoking the Audit Analysis Utility
- overview, Analyzing a Log File
- prerequisites, Recommended Procedure
- report formats, Qualifiers for the Audit Analysis Utility
- types of output, Providing Report Specifications
- when to ignore events, Recommended Procedure
- Audit listener mailboxes
- capturing audit event messages, Using a Listener Mailbox
- disabling, Using a Listener Mailbox
- example of programs for, Using a Listener Mailbox
- AUDIT
privilege, AUDIT Privilege (System)
- Audit server databases, Tasks Performed by the Audit Server
- Audit
server processes
- changing disk transfer rate, Adjusting the Transfer of Messages to Disk
- controlling message flow, Choosing the Number of Outstanding Messages That Trigger Process Suspension
- delaying delivery of event messages, Changing the Point in Startup When the Operating System Initiates Auditing
- disabling, Disabling and Reenabling Startup of the Audit Server
- enabling, Disabling and Reenabling Startup of the Audit Server
- error handling, Allocating Disk Space for the Audit Log File, Error Handling in the Auditing Facility
- final server action, Reacting to Insufficient Memory
- managing, Managing the Auditing Subsystem
- memory limitations and, Reacting to Insufficient Memory
- pre-extending log files, Allocating Disk Space for the Audit Log File
- tasks performed by, Tasks Performed by the Audit Server
- Audit
trails
- in security models, Reference Monitor Concept
- Auditing
- applications, Security Auditing
- as security
feature, Security Auditing
- of security
events, Security Auditing
- Authentication and credentials management
extensions (ACME), Authentication and Credentials Management Extensions (ACME) Subsystem
- Authentication
cards, Authentication Cards
- Authentication, external, Enabling External Authentication
- Authority-based systems, Authorization Database Represented as an Access Matrix
- Authorization databases, Authorization Database, Authorization Database Represented as an Access Matrix
- access matrix, Authorization Database Represented as an Access Matrix
- adding users, Assigning Appropriate Accounts to Users
- auditing, Auditing Categories of Activity
- auditing modifications to, Kinds of System Activity the Operating System Can Report
- contents, Reference Monitor Concept
- synchronizing authorization on clustered
systems, Synchronizing Authorization Data
- Authorize utility (AUTHORIZE)
- /GENERATE_PASSWORD qualifier, Primary Passwords
- ADD/FLAG command, Enabling External Authentication
- ADD/IDENTIFIER command, Restoring the Rights Database, Setting Up the Resource Identifier
- ADD/PROXY command, Procedure for Creating a Proxy Account, Setting Up Accounts for Local and Remote Users
- CREATE/PROXY command, Procedure for Creating a Proxy Account
- CREATE/RIGHTS command, Populating the Rights Database
- EXTAUTH flag, Enabling External Authentication
- GRANT/IDENTIFIER command, Assigning Identifiers to Users, Setting Up the Resource Identifier
- MODIFY/FLAG command, Enabling External Authentication
- MODIFY/SYSTEM_PASSWORD
command, System Passwords
- REMOVE/IDENTIFIER command, Removing Identifiers
- SHOW/IDENTIFIER command, Displaying the Database
- SHOW/RIGHTS command, Displaying the Database
- Autodial protocol, Establishing a Dynamic Asynchronous Connection
- Automatic password generation, Selecting Your Own Password, Using Generated Passwords
- disadvantages, Using Generated Passwords
- example, Using Generated Passwords
- minimum length, Using Generated Passwords
B- Backup operations
- general recommendations, Protecting Backup Media
- performed from captive privileged account, Privileged Accounts
- BACKUP utility, Encrypting Save Sets
- Backup utility (BACKUP)
- general recommendations, Protecting Backup Media
- performed from captive privileged account, Privileged Accounts
- Batch identifiers, Major Types of Rights Identifiers
- Batch jobs
- affected
by shift restrictions, Using an Account Restricted to Certain Days and Times
- authorization, When the System Logs In for You: Network and Batch Logins
- password protection and cardreaders, Guidelines for Protecting Your Password
- Batch logins, When the System Logs In for You: Network and Batch Logins
- Binary output from Audit Analysis utility, Providing Report Specifications
- Break key and secure servers, Using the Secure Server
- Break-in alarms, Alarm Messages
- Break-in attempts, Types of Computer Security Problems, Failing to Enter the Correct Password During a Dialup Login
- auditing, Auditing Categories of Activity, Kinds of System Activity the Operating System Can Report
- counteraction through dual passwords, Secondary Passwords
- detecting, Detecting Intruders, Setting the Exclusion Period
- evading, Knowing When Break-In Evasion Procedures Are in Effect
- security audit report and, Examining the Report
- BUGCHK
privilege, BUGCHK Privilege (Devour)
- Buses, default
security elements, Template Profile
- BYPASS privilege
- description, BYPASS Privilege (All)
- effect on control access, Using Control Access to Modify an Object Profile
- overriding access controls, How the System Determines if a User Can Access a Protected Object, How Privileges Affect Protection Mechanisms
C- Capability objects
- as protected objects, Classes of Protected Objects
- elements of, Capabilities
- reestablishing profile, Permanence of the Object
- template profile, Template Profile
- types of access, Types of Access
- Capability-based systems, Authorization Database Represented as an Access Matrix
- Captive accounts, Password Requirements for Different Types of Accounts, Interactive Accounts
- command procedures, Guidelines for Captive Command Procedures
- Ctrl/Y key sequence and, Captive Accounts
- disabling mail and notification of delivery, New Mail Announcements
- example of production account, Limited-Account Example
- locked passwords and, Qualifiers Required to Define Captive Accounts
- when to use, Types of System Accounts
- Card readers, default security elements, Template Profile
- Case
sensitivity
- in passwords and user names, Case Sensitivity in Passwords and User Names
- CDSA, Common Data Security Architecture (CDSA)
- Ciphertext, Encryption Process
- Cluster
environments
- building single security domain, Building a Common Environment
- managing audit log file, Managing the Audit Log File
- protected object databases, Storing Profiles and Auditing Information
- protected objects, Protecting Objects
- security considerations, Securing a Cluster
- security implementation, Using the System Management Utility
- synchronizing authorization data, Synchronizing Authorization Data
- SYSMAN requirements, Using the System Management Utility
- system file recommendations, Recommended Common System Files
- system file requirements, Required Common System Files
- Cluster managers
and security administrators, Securing a Cluster
- CLUSTER_AUTHORIZE.DAT files, Managing Cluster Membership
- Clusterwide
intrusion detection, clusterwide Intrusion Detection
- CMEXEC
privilege, CMEXEC Privilege (All)
- CMKRNL
privilege, CMKRNL Privilege (All)
- Command mode
for Audit Analysis utility, manipulating the display, Using the Audit Analysis Utility Interactively
- Command procedures
- access control strings
in, Protecting Information in Access Control Strings
- STARTNET.COM, Establishing a Dynamic Asynchronous Connection
- SYSTARTUP_VMS.COM, Establishing a Dynamic Asynchronous Connection
- Commands, usage restrictions, Restricting DCL Command Usage
- Common Data
Security Architecture (CDSA), Common Data Security Architecture (CDSA)
- Common event flag clusters
- as protected objects, Classes of Protected Objects
- events audited, Kinds of Auditing Performed
- privilege requirements, Privilege Requirements
- reestablishing security profile, Permanence of the Object
- security elements of, Common Event Flag Clusters
- system modifications of templates, Template Profile
- template profile, Template Profile
- types of access to, Types of Access
- Communications devices
- default security elements, Template Profile
- Compilers, restricting use with ACLs, Protecting System Files
- Confidential files, security auditing
and, Adding Access Control Entries to Sensitive Files
- CONNECT command, /LOGOUT qualifier, Removing Disconnected Processes
- Connections
- auditing, Kinds of System Activity the Operating System Can Report
- Connections,
auditing of, Kinds of System Activity the Operating System Can Report
- Consoles, enabling passwords for, Console Passwords
- Control access
- acquiring, Access Required to Modify a Profile, Types of Access in a Protection Code, Using Control Access to Modify an Object Profile
- common event flag clusters, Types of Access
- devices, Types of Access
- files, Types of Access
- global sections, Types of Access
- limitations, Using Control Access to Modify an Object Profile
- logical name tables, Types of Access
- queues, Types of Access
- resource domains, Types of Access
- security class, Types of Access
- volumes, Types of Access
- COPY command
- /PROTECTION qualifier, Adjusting Protection Defaults
- security profile assigned, Using the COPY and RENAME Commands
- Create access
- logical
name tables, Types of Access
- volumes, Types of Access
- CREATE/PROXY command in Authorize utility, Procedure for Creating a Proxy Account
- CREATE/RIGHTS
command in Authorize utility, Populating the Rights Database
- Creator
ACEs, Rules for Assigning a Protection Code and ACL
- example, Setting Up the ACL
- with resource identifiers, Resource Attribute
- Ctrl/B key
sequence, Protecting Information in Access Control Strings
- Ctrl/Y
key sequence and restricted accounts, Restricted Accounts
D- Database
- volatile network, Establishing a Dynamic Asynchronous Connection
- Databases
- authorization, Authorization Database, Authorization Database Represented as an Access Matrix
- protected objects, Storing Profiles and Auditing Information
- rights, Displaying the Database
- synchronizing authorization
on clustered systems, Synchronizing Authorization Data
- volatile
network, Establishing a Dynamic Asynchronous Connection
- DCL commands
- SET HOST/DTE in network operations, Establishing a Dynamic Asynchronous Connection
- SET
TERMINAL in network operations, Establishing a Dynamic Asynchronous Connection
- DCL tables, modifications for security, Restricting DCL Command Usage
- DDCMP
(Digital Data Communications Message Protocol)
- asynchronous driver, Establishing a Dynamic Asynchronous Connection
- DECnet
- cluster nodes and, Using DECnet Between Cluster Nodes
- dynamic
asynchronous connection, Establishing a Dynamic Asynchronous Connection
- INBOUND
parameter, Establishing a Dynamic Asynchronous Connection
- installing dynamic asynchronous
connection, Establishing a Dynamic Asynchronous Connection
- network
objects, Configuring Network Objects Manually
- nonprivileged user name, Using DECnet Application (Object) Accounts
- receive password, Establishing a Dynamic Asynchronous Connection
- receive passwords, Establishing a Dynamic Asynchronous Connection
- removing, Removing Default DECnet Access to the System
- transmit
password, Establishing a Dynamic Asynchronous Connection
- transmit passwords, Establishing a Dynamic Asynchronous Connection
- DECRYPT command
- purpose, Decrypting Files
- Decryption
- requirements, Maintaining Keys
- DECwindows screens, clearing, Using Generated Passwords, Protecting Information in Access Control Strings, Clearing Your Terminal Screen
- Default attribute
for ACEs, Establishing an Inheritance Scheme for Files
- Default ownership
- for directories, Setting Up the ACL
- for files, Controlling File Access
- for protected objects, Setting Default Protection and Ownership, Setting Defaults for Objects Other Than Files
- Default protection
- Alpha system files, Protecting System Files
- for directories, Rules for Assigning a Protection Code and ACL
- for files, Rules for Assigning a Protection Code and ACL
- for processes, Controlling File Access, Adjusting Protection Defaults
- for system files, Protection for OpenVMS System Files
- management, Setting Default Protection and Ownership
- Default Protection
ACEs, Providing a Default Protection Code for a Directory Structure, Controlling File Access, Adjusting Protection Defaults
- examples, Admitting Remote Users to Multiple Accounts
- generating default file protection, Rules for Assigning a Protection Code and ACL
- Delete access
- common
event flag clusters, Types of Access
- files, Types of Access
- granting through protection
codes, Format of a Protection Code
- logical
name tables, Types of Access
- queues
- through ACLs, Types of Access
- through
protection codes, Types of Access
- volumes, Types of Access
- DELETE command, /ERASE qualifier, Overwriting Disk Blocks
- DES
- modes, Encryption Algorithms
- DES algorithm, DES Encryption Algorithm
- DETACH privilege, IMPERSONATE Privilege (All) (Formerly DETACH)
- Devices
- access requirements, Access Requirements for I/O Operations
- as protected objects, Classes of Protected Objects
- controlling access through ACLs, Limiting Access to a Device
- default security elements, Template Profile
- events audited, Kinds of Auditing Performed
- modifying security profiles of, Setting Up Profiles for New Devices
- privilege requirements, Privilege Requirements
- profile
storage, Permanence of the Object
- protecting
BACKUP save sets, Protecting a Backup Save Set
- security elements of, Devices
- spooled, access requirements, Access Requirements for I/O Operations
- template security profiles, Template Profile
- terminal
configuration, Configuring Terminal Lines for Modems
- DIAGNOSE
privilege, DIAGNOSE Privilege (Objects)
- Dialup identifiers, Major Types of Rights Identifiers
- Dialup lines
- connection security, Establishing a Dynamic Asynchronous Connection
- controlling access to, Types of Passwords
- using for dynamic asynchronous
connection, Establishing a Dynamic Asynchronous Connection
- using in a public area, Breaking the Connection to a Dialup Line
- Dialup logins, Logging In Interactively: Local, Dialup, and Remote Logins
- breaking connections, Breaking the Connection to a Dialup Line
- controlling retries, Last Login Messages
- failures, Failing to Enter the Correct Password During a Dialup Login
- retries, Failing to Enter the Correct Password During a Dialup Login
- Directories
- access control through ACLs, Ordering ACEs Within a List
- access
requirements, Types of Access, Access Requirements
- assigning
a security profile, Rules for Assigning a Protection Code and ACL
- controlling access to files, Establishing an Inheritance Scheme for Files, Controlling File Access
- creating, Creation Requirements
- events audited, Kinds of Auditing Performed
- ownership
- by resource identifier, Setting Up the Directory of a Resource Identifier
- changing access to files, Controlling File Access
- setting default, Controlling File Access
- setting
default file protection, Establishing an Inheritance Scheme for Files
- setting
file protection, Controlling File Access
- DIRECTORY command
- /SECURITY qualifier, Suggestions for Optimizing File Security
- DIRECTORY command, /SECURITY qualifier, Suggestions for Optimizing File Security
- Disconnected job messages, Local Login Messages
- Discretionary access controls, GRPNAM Privilege (Devour), SYSNAM Privilege (All)
- DISFORCE_PWD_CHANGE flag, Enforcing Change of Expired Password
- Disk quotas
- as
restriction for users, Restricting Disk Volumes
- charging to identifiers, Resource Attribute
- Disk scavenging
- discouraging, Protecting Disks
- preventing, Protecting Information When Disk Space Is Reassigned, Overwriting Disk Blocks
- Disk space
- charging to identifier, Setting Up the Resource Identifier
- requirements
for security audit log file, Allocating Disk Space for the Audit Log File
- usage
and charging, Resource Attribute
- Disk volumes
- controlling
access, Volumes
- protecting, Volumes
- restrictions, Restricting Disk Volumes
- Disks
- accessing
deleted data, Accessibility of Data in a File
- changing message transfer rate, Adjusting the Transfer of Messages to Disk
- default security elements, Template Profile
- erase-on-allocate, Protecting Information When Disk Space Is Reassigned, Setting a High-water Mark
- erasing, Setting a High-water Mark, Erasing Techniques
- erasure patterns, Protecting Information When Disk Space Is Reassigned, Overwriting Disk Blocks
- high-water marking, Protecting Information When Disk Space Is Reassigned, Setting a High-water Mark
- managing
security profiles, Setting Up Profiles for New Devices
- protecting
- after file deletion, Protecting Information When Disk Space Is Reassigned
- protecting
after file deletion, Protecting Information When Disk Space Is Reassigned
- DISMOUNT command, alarms, Alarm Messages
- DOWNGRADE
privilege, DOWNGRADE Privilege (All)
- DSE (data security erase)
- tailoring, Erasing Techniques
- Dual
passwords, Secondary Passwords
- Dynamic asynchronous connections
- automatic switching of terminal line, Establishing a Dynamic Asynchronous Connection
- connection example, Establishing a Dynamic Asynchronous Connection
- manual switching of terminal
line, Establishing a Dynamic Asynchronous Connection
- passwords for, Establishing a Dynamic Asynchronous Connection
- procedure
for establishing, Establishing a Dynamic Asynchronous Connection
- security, Establishing a Dynamic Asynchronous Connection
- switching
of terminal line, Establishing a Dynamic Asynchronous Connection
- terminating the link, Establishing a Dynamic Asynchronous Connection
- verifier, Specifying Routing Initialization Passwords
- Dynamic
attribute for identifiers, Dynamic Attribute
- Dynamic attributes
- for identifiers, Dynamic Attribute
E- Echoing, passwords and, Entering a System Password
- Editing
ACLs, Adding ACEs to an Existing ACL, Copying an ACL
- Emergency accounts and privileges, Limiting User Privileges
- Emulator
- terminal, Establishing a Dynamic Asynchronous Connection
- ENCRYPT$MAC.LIS
- for storing
MAC values, Specifying a Listing File
- ENCRYPT/CREATE_KEY command
- verifying, Verifying Key Creation
- Encryption, Using Encryption
- defining keys, Defining Keys
- ENCRYPT command, Encrypting Files
- Encryption process
- overview, Encryption
- Environmental
factors in security, Building a Secure System Environment
- Environmental identifiers, Conditionalizing Identifiers for Different Users
- conditionalizing general identifiers, Conditionalizing Identifiers for Different Users
- example, Types of Identifiers, Displaying the Rights Identifiers of Your Process, Ordering ACEs Within a List
- Identifier ACEs and, Limiting Access to an Environment
- Erase-on-allocate, Protecting Information When Disk Space Is Reassigned, Setting a High-water Mark
- Erase-on-delete, Overwriting Disk Blocks, Erasing Techniques
- Erasing disks, Erasing Techniques
- Erasure patterns, Protecting Information When Disk Space Is Reassigned, Overwriting Disk Blocks, Erasing Techniques
- Event tolerance and security levels, Levels of Security Requirements
- Execute access
- files, Types of Access
- global sections, Types of Access
- granting through protection
codes, Format of a Protection Code
- Expiration
- of account, Renewing an Expired Account
- of password, Changing an Expired Password, Primary Passwords
- of secondary
password, Changing an Expired Password
- password system messages, Changing Your Password As You Log In, Changing an Expired Password
- Expired passwords, system message, Changing Your Password As You Log In
- EXQUOTA
privilege, EXQUOTA Privilege (Devour)
- EXTAUTH flag, Enabling External Authentication
- External
authentication, Enabling External Authentication
- DECnet-Plus and NET_CALLOUTs parameter, Specifying the SYS$SINGLE_SIGNON Logical Name Bits
- DECnet-Plus requirement, Specifying the SYS$SINGLE_SIGNON Logical Name Bits
- defining logical
names, Enabling External Authentication
- disabling when
network is down, Overriding External Authentication
- failed connection attempts on POP
server, Specifying the SYS$SINGLE_SIGNON Logical Name Bits
- impact on layered products and
applications, Impact on Layered Products and Applications
- marking user accounts, Enabling External Authentication
- NET PASSWORD command, Setting a New Password
- password verification, User Name Mapping and Password Verification
- setting a password, Setting a New Password
- specifying SYS$SINGLE_SIGNON
logical name bits, Specifying the SYS$SINGLE_SIGNON Logical Name Bits
- using the /LOCAL_PASSWORD
qualifier, Overriding External Authentication
F- F$MODE lexical function, Types of Logins and Login Classes
- Facility identifiers, Types of Identifiers
- FAL (file access listener) recommendations, Summary of Network Objects
- File browsers, Asking Your Security Administrator to Enable Auditing, Security Auditing, Identifying the Perpetrator
- File
protection, Contents of an Object's Profile, Files, Controlling File Access
- auditing, Security Auditing
- DCL commands for, Protecting System Files
- setting default ACLs, Establishing an Inheritance Scheme for Files
- Files
- access control
through ACLs, Ordering ACEs Within a List
- access requirements, Types of Access, Access Requirements
- accessing
- allocated disk blocks, Accessibility of Data in a File
- by file identifier, Access Requirements
- adding ACEs
for security auditing, Adding Access Control Entries to Sensitive Files, Adding Security-Auditing ACEs
- applying an alarm to, Adding Access Control Entries to Sensitive Files
- as protected objects, Classes of Protected Objects
- assigning protection codes, Rules for Assigning a Protection Code and ACL
- assigning security profiles, Profile Assignment, Rules for Assigning a Protection Code and ACL, Controlling File Access
- auditing
access to, Auditing Access to Your Account and Files, Adding Access Control Entries to Sensitive Files, Auditing Protected Objects
- changing security profiles, Rules for Assigning a Protection Code and ACL
- confidential, protecting, Asking Your Security Administrator to Enable Auditing
- controlling access with Identifier ACEs, Using Identifier Access Control Entries (ACEs)
- copying
- from remote account, Using Proxy Login Accounts to Protect Passwords
- creating
- dependency on directory ownership, Controlling File Access
- requirements for, Creation Requirements
- default protection, Providing a Default Protection Code for a Directory Structure
- erasing data from disks, Overwriting Disk Blocks
- events audited, Kinds of Auditing Performed
- exceptions to ownership rules, Owner
- managing directory defaults, Setting Up the ACL
- naming rules, Naming Rules
- optimizing security, Suggestions for Optimizing File Security
- owned by
resource identifier, Rules for Assigning a Protection Code and ACL, Setting Up the ACL
- ownership rules, Rules for Assigning Ownership
- protecting data after deletion, Protecting Information When Disk Space Is Reassigned
- protecting mail, Suggestions for Optimizing File Security
- protection required for proxy access, Using Proxy Login Accounts to Protect Passwords
- restoring default security elements, Restoring a File's Default ACL
- restoring default security profiles, Restoring a File's Default Security Profile
- security auditing and, Adding Access Control Entries to Sensitive Files, Kinds of Auditing Performed
- security elements of, Files
- setting default protection and
ownership, Controlling File Access
- sharing and exchanging in network environment, Sharing Files in a Network, Admitting Remote Users to Multiple Accounts
- sharing for a cluster system, Synchronizing Authorization Data
- transfers with MAIL, Sharing Files in a Network
- Flush interval, Adjusting the Transfer of Messages to Disk
- Flushing messages to disk, Adjusting the Transfer of Messages to Disk
- Foreign volumes,
access requirements, Access Requirements for I/O Operations
- Formats
- Identifier
ACE, Using Identifier Access Control Entries (ACEs)
- protection
code, Controlling Access with Protection Codes
- rights identifiers, Types of Identifiers
- security-auditing ACE, Access Control Entries (ACEs) for Security Auditing
- UIC (user identification code), Format of a UIC
G- General identifiers, Granting Access to Particular Users
- design considerations, Naming Individual Users in ACLs
- example, Displaying the Rights Identifiers of Your Process, Ordering ACEs Within a List
- format, Major Types of Rights Identifiers
- Generated passwords, Using Generated Passwords
- disadvantages, Using Generated Passwords
- example, Using Generated Passwords
- initial passwords, Primary Passwords
- length, Requiring a Minimum Password Length
- minimum length, Using Generated Passwords
- requiring, Secondary Passwords, History Lists
- Global
sections
- events audited, Kinds of Auditing Performed
- group, Classes of Protected Objects
- privilege requirements, Privilege Requirements
- reestablishing security
profile, Permanence of the Object
- restricting access, Template Profile
- security elements of, Global Sections
- system, Classes of Protected Objects
- template profiles, Template Profile
- types of access, Types of Access
- Group numbers
- in UICs, Format of a UIC
- reserved UICs, Format of a UIC
- uniqueness
requirement for clustered systems, Synchronizing Authorization Data
- Group numbers and passwords, Managing Cluster Membership
- Group numbers and passwords, setting
up for cluster, Managing Cluster Membership
- GROUP
privilege, GROUP Privilege (Group)
- Group UIC
names, Format of a UIC
- Group users
(security category), Protection Code, Format of a Protection Code
- Groups
- design of, Displaying the Database
- guidelines for organization, Designing User Groups
- UIC design, Designing User Groups
- GRPNAM privilege, Privilege Requirements, GRPNAM Privilege (Devour)
- GRPPRV privilege, GRPPRV Privilege (Group)
- description, GRPPRV Privilege (Group)
- effect on protection mechanisms, How Privileges Affect Protection Mechanisms
- giving rights of system
user, How the System Determines if a User Can Access a Protected Object, Format of a Protection Code
- granting control access, How Privileges Affect Protection Mechanisms
- Guest accounts
- as limited-access accounts, Guest Accounts
H- Hardcopy output
- disposal of, Disposing of Hardcopy Output
- Hardcopy terminals, logout considerations, Disposing of Hardcopy Output
- Hidden
attribute, Displaying ACLs
- High-water
marking, Protecting Information When Disk Space Is Reassigned, Setting a High-water Mark, Prevention Through High-Water Marking
- performance and, Prevention Through High-Water Marking
- History, History Lists
- Holder
Hidden attribute, Holder Hidden Attribute
- Holders
of a rights identifier
- associating with identifier, Assigning Identifiers to Users
- displaying records, Displaying the Database
- granting access to, Granting Access to Particular Users
- removing from rights database, Removing Holder Records
I- I/O channels, access requirements, Access Requirements for I/O Operations
- I/O operations, access requirements for devices, Access Requirements for I/O Operations
- Identifier ACEs, Using Identifier Access Control Entries (ACEs), Adding ACEs to an Existing ACL, Building the Subsystem
- ACE order, Ordering ACEs Within a List
- adding to an ACL, Adding ACEs to an Existing ACL
- conditionalizing access, Limiting Access to an Environment
- creating, Using Identifier Access Control Entries (ACEs)
- Default attribute, Establishing an Inheritance Scheme for Files
- denying access, Preventing Users from Accessing an Object
- format, Using Identifier Access Control Entries (ACEs)
- interpreting, Using Identifier Access Control Entries (ACEs)
- protected subsystems and, Building the Subsystem
- using general identifiers, Granting Access to Particular Users
- Identifier
attributes, Customizing Identifiers, Subsystem Attribute
- description of, Customizing Identifiers
- Dynamic, Dynamic Attribute
- Holder Hidden, Holder Hidden Attribute
- Name Hidden, Name Hidden Attribute
- No Access, No Access Attribute
- Resource, Resource Attribute
- Subsystem, Subsystem Attribute
- Identifiers
- adding to rights database, Adding Identifiers
- as
directory owners, Setting Up the Resource Identifier
- as
file owners, Access Requirements, Rules for Assigning a Protection Code and ACL
- assigning
to users, Assigning Identifiers to Users
- auditing use of, Kinds of System Activity the Operating System Can Report
- creating, Granting Access to Particular Users
- customizing, Conditionalizing Identifiers for Different Users
- displaying process, Displaying the Rights Identifiers of Your Process
- environmental, Types of Identifiers, Displaying the Rights Identifiers of Your Process, Conditionalizing Identifiers for Different Users
- facility, Types of Identifiers
- format, Types of Identifiers
- general, Major Types of Rights Identifiers, Displaying the Rights Identifiers of Your Process, Granting Access to Particular Users
- in ACEs, Using Identifier Access Control Entries (ACEs)
- of a process, Protecting Data
- protected
subsystems and, Giving Users Access
- removing, Removing Identifiers
- reserved, How Protected Subsystems Work
- resource
- and directory ownership, Controlling File Access
- security audit reports and, How Rights Identifiers Appear in the Audit Trail
- types, Types of Identifiers
- UIC, Major Types of Rights Identifiers, Displaying the Rights Identifiers of Your Process
- uniqueness requirement, Synchronizing Authorization Data
- Images
- installing
- security ramifications, Installing Images with Privilege
- Images, installing
- security ramifications, Installing Images with Privilege, Advantages of Protected Subsystems
- subsystem images, Advantages of Protected Subsystems, Design Considerations
- IMPERSONATE
privilege, IMPERSONATE Privilege (All) (Formerly DETACH)
- IMPORT
privilege, IMPORT Privilege (Objects)
- INBOUND parameter for node type specification, Establishing a Dynamic Asynchronous Connection
- Incoming
proxy access, enabling or disabling, Enabling and Disabling Incoming Proxy Access
- INITIALIZE command
- /ERASE qualifier, Overwriting Disk Blocks
- INITIALIZE
command, /ERASE qualifier, Overwriting Disk Blocks, Erasing Techniques
- Install utility
(INSTALL)
- alarms, Alarm Messages
- auditing changes made through, Kinds of System Activity the Operating System Can Report
- security ramifications, Installing Images with Privilege, Advantages of Protected Subsystems
- Interactive
accounts, Types of System Accounts
- Interactive
identifiers, Major Types of Rights Identifiers
- Interactive
logins, Types of Logins and Login Classes
- classes, Logging In Interactively: Local, Dialup, and Remote Logins
- dialup, Logging In Interactively: Local, Dialup, and Remote Logins, Failing to Enter the Correct Password During a Dialup Login
- local, Logging In Interactively: Local, Dialup, and Remote Logins
- remote, Logging In Interactively: Local, Dialup, and Remote Logins
- system message, Local Login Messages
- Interactive mode
- processes, Types of Logins and Login Classes
- Intrusion
databases, Understanding the Intrusion Database
- Intrusions
- attempts, Failing to Enter the Correct Password During a Dialup Login
- detection, Detecting Intruders
- clusterwide, clusterwide Intrusion Detection
- counteraction through dual passwords, Secondary Passwords
- database, Understanding the Intrusion Database
- evasive procedures, Knowing When Break-In Evasion Procedures Are in Effect
- reporting events, Additional Events to Audit
- setting exclusion period, Setting the Exclusion Period
- system parameters for, How Intrusion Detection Works
L- Last login messages, Observing Your Last Login Time
- disabling, Last Login Messages
- LGI system parameters, Parameters for Controlling Login Attempts
- controlling login
attempts, System Parameters Controlling Login Attempts
- LGI_BRK_DISUSER, Parameters for Controlling Login Attempts
- LGI_BRK_LIM, Parameters for Controlling Login Attempts
- LGI_BRK_TERM, Parameters for Controlling Login Attempts
- LGI_BRK_TMO, Parameters for Controlling Login Attempts
- LGI_HID_TIM, Parameters for Controlling Login Attempts
- LGI_RETRY_LIM, Parameters for Controlling Login Attempts
- LGI_RETRY_TMO, Parameters for Controlling Login Attempts
- LGI_TWD_TMO, Parameters for Controlling Login Attempts
- Lifetime of accounts, Renewing an Expired Account
- Lifetime of
passwords, Changing Your Password, Changing a Secondary Password
- Limited-access accounts, Types of System Accounts
- LINK command,
/NOTRACEBACK qualifier, Installing Images with Privilege
- Links
- terminating
dynamic asynchronous, Establishing a Dynamic Asynchronous Connection
- Listener devices,
example of programs for, Using a Listener Mailbox
- Local identifiers, Major Types of Rights Identifiers
- Lock access, Types of Access
- LOCKPWD flag, Password Requirements for Different Types of Accounts
- LOG_IO privilege, Privilege Requirements, LOG_IO Privilege (All)
- Logging
- access to protected objects, Auditing Protected Objects
- security
audit events, Ways to Generate Audit Information, Methods of Capturing Event Messages
- terminal sessions, Logging a User's Session
- Logging out
- breaking
dialup connection, Breaking the Connection to a Dialup Line
- deciding when it is necessary, Logging Out Without Compromising System Security
- from disconnected processes, Removing Disconnected Processes
- reasons
for, Logging Out Without Compromising System Security
- security considerations, Logging Out Without Compromising System Security, Clearing Your Terminal Screen
- Logical I/O
access, Types of Access
- Logical
name tables
- as protected objects, Classes of Protected Objects
- events audited, Kinds of Auditing Performed
- privilege requirements, Privilege Requirements
- reestablishing security profile, Permanence of the Object
- security elements of, Logical Name Tables
- template profiles, Template Profile
- types of access, Types of Access
- Logical
names
- defining for external authentication, Enabling External Authentication
- Login alarms, Alarm Messages
- enabling, Kinds of System Activity the Operating System Can Report
- Login classes, Types of Logins and Login Classes
- batch, When the System Logs In for You: Network and Batch Logins
- dialup, Logging In Interactively: Local, Dialup, and Remote Logins
- interactive, Logging In Interactively: Local, Dialup, and Remote Logins
- local, Logging In Interactively: Local, Dialup, and Remote Logins
- network, When the System Logs In for You: Network and Batch Logins
- noninteractive, When the System Logs In for You: Network and Batch Logins
- remote, Logging In Interactively: Local, Dialup, and Remote Logins
- restrictions on, Observing Your Login Class Restrictions
- Login command
procedures
- for restricted accounts, Privileged Accounts, Guidelines for Captive Command Procedures
- proper protection for, Potentially Harmful Programs
- Login failures
- alarms, Alarm Messages
- auditing, Kinds of System Activity the Operating System Can Report
- break-in evasion and, Knowing When Break-In Evasion Procedures Are in Effect
- causes of, Login Failures: When You Are Unable to Log In
- dialup logins, Failing to Enter the Correct Password During a Dialup Login
- expired accounts, Renewing an Expired Account
- login class restrictions and, Observing Your Login Class Restrictions
- messages, Local Login Messages, Observing Your Last Login Time
- password grabber programs, Guidelines for Protecting Your Password
- retries and, Failing to Enter the Correct Password During a Dialup Login
- security audit report and, Examining the Report
- shift restrictions, Using an Account Restricted to Certain Days and Times
- system passwords and, Using a Terminal That Requires a System Password
- Login
messages, Reading Informational Messages
- announcement, Local Login Messages
- controlling, Informational Display During Login, New Mail Announcements
- disconnected job, Local Login Messages
- expired password, Changing Your Password As You Log In, Changing an Expired Password
- last successful interactive login, Local Login Messages
- last successful noninteractive login, Local Login Messages
- new mail, Local Login Messages
- number of login failures, Local Login Messages
- suppressing, Reading Informational Messages, Observing Your Last Login Time
- welcome, Local Login Messages
- Login programs,
authentication by secure terminal server, Guidelines for Protecting Your Password
- Logins
- auditing, Kinds of System Activity the Operating System Can Report
- batch, When the System Logs In for You: Network and Batch Logins
- changing password, Obtaining Your Initial Password
- changing password during, Changing Your Password As You Log In
- controlling, Types of Passwords
- default
process protection and, Rules for Assigning a Protection Code and ACL
- dialup, Logging In Interactively: Local, Dialup, and Remote Logins
- supplying password, Failing to Enter the Correct Password During a Dialup Login
- disabled
- by break-in evasion, Knowing When Break-In Evasion Procedures Are in Effect
- by shift
restriction, Using an Account Restricted to Certain Days and Times
- expired accounts, Renewing an Expired Account
- flags, Enforcing Change of Expired Password
- interactive, Types of Logins and Login Classes
- classes of, Logging In Interactively: Local, Dialup, and Remote Logins
- most recent, Local Login Messages
- local, Logging In Interactively: Local, Dialup, and Remote Logins
- monitoring
last, Observing Your Last Login Time
- network, When the System Logs In for You: Network and Batch Logins
- noninteractive, Types of Logins and Login Classes
- classes of, When the System Logs In for You: Network and Batch Logins
- most recent, Local Login Messages
- permitted time periods, Using an Account Restricted to Certain Days and Times
- remote, Logging In Interactively: Local, Dialup, and Remote Logins
- logging out, Clearing Your Terminal Screen
- system passwords and, System Passwords
- restricting
with system passwords, System Passwords
- secure terminal
server, Guidelines for Protecting Your Password, Using the Secure Server
- security
implications, Obtaining Your Initial Password
- simplifying
for user with ALF (automatic login facility), Automatic Login Accounts
- system parameters controlling, System Parameters Controlling Login Attempts
- time out, Entering a Secondary Password
- with external authentication, Logging In Using External Authentication
- Logout alarms, Alarm Messages
- Logout auditing, Kinds of System Activity the Operating System Can Report
- LOGOUT
command, Clearing Your Terminal Screen
- /HANGUP qualifier, Breaking the Connection to a Dialup Line
M- MAC
- security, Authenticating Files
- specifying database, Specifying a File for MACs Generated from File Contents
- Mail files, recommended protection
for, Suggestions for Optimizing File Security
- MAIL objects, recommended access, Summary of Network Objects
- Mail
utility (MAIL)
- controlling notification messages, New Mail Announcements
- transferring text files, Sharing Files in a Network
- MAIL.EXE
- reinstalling with privileges, Protecting System Files
- Mailboxes
- default security elements, Template Profile
- for audit event messages, Methods of Capturing Event Messages
- modifying
security profiles, Setting Up Profiles for New Devices
- privilege requirements, Privilege Requirements
- Maintenance tasks for secure systems, Ongoing Tasks to Maintain a Secure System
- Manage access, Types of Access
- Mandatory access
controls, BYPASS Privilege (All), IMPORT Privilege (Objects), UPGRADE Privilege (All)
- MAXSYSGROUP system parameter, Format of a Protection Code
- Media initialization
- access requirements, Volumes
- restricting with ACLs, Protecting System Files
- Member numbers in UICs, Format of a UIC
- Member UIC names, Format of a UIC
- Memory consumption by ACLs, Designing ACLs
- Messages
- announcement, Local Login Messages
- security disadvantages, Announcement Message
- auditing, Reporting Security-Relevant Events
- auditing
security-relevant events, Auditing File Access
- disabling last login, Last Login Messages
- last successful
interactive login, Local Login Messages
- login, Reading Informational Messages
- login
failures, Observing Your Last Login Time
- suppressing, Reading Informational Messages, Informational Display During Login
- suppressing
last login, Observing Your Last Login Time
- welcome, Local Login Messages
- MFD (master
file directory), Rules for Assigning a Protection Code and ACL
- MIRROR objects, Summary of Network Objects
- Modems, Establishing a Dynamic Asynchronous Connection
- MODIFY user/FLAG=AUDIT command in Authorize
utility, Modifying a User Authorization Record, Considering the Performance Impact
- MODIFY/SYSTEM_PASSWORD command in Authorize
utility, System Passwords
- MOM (maintenance operations module) objects, Summary of Network Objects
- MOUNT
command, alarms, Alarm Messages
- MOUNT
privilege, MOUNT Privilege (Normal)
- Mounting volumes
- access requirements, Volumes
- security audits and, Additional Events to Audit
- with protected subsystems, Enabling Protected Subsystems on a Trusted Volume
N- Name
Hidden attribute, Name Hidden Attribute
- Naming conventions
- capability objects, Naming Rules
- common event flag clusters, Naming Rules
- devices, Naming Rules
- files, Naming Rules
- global sections, Naming Rules
- logical name tables, Naming Rules
- queues, Naming Rules
- resource domains, Naming Rules
- security class, Naming Rules
- Naming
rules
- capability objects, Naming Rules
- common event flag clusters, Naming Rules
- devices, Naming Rules
- files, Naming Rules
- global sections, Naming Rules
- logical name tables, Naming Rules
- queues, Naming Rules
- resource domains, Naming Rules
- security class, Naming Rules
- NCP (Network Control Program)
- auditing database modifications, Kinds of System Activity the Operating System Can Report
- NET PASSWORD command, Setting a New Password
- NET$PROXY.DAT
files, Setting Up a Proxy Database
- auditing, Auditing Categories of Activity
- NETMBX
privilege, NETMBX Privilege (Normal)
- NETPROXY.DAT files, Setting Up a Proxy Database
- auditing, Auditing Categories of Activity
- normal protection, Password Protection Checklist
- Network access control strings, Guidelines for Protecting Your Password, Protecting Information in Access Control Strings, Secondary Passwords, Using Explicit Access Control
- Network accounts
- DECNET account, removing, Removing Default DECnet Access to the System
- network objects, Configuring Network Objects Manually
- Network databases, Establishing a Dynamic Asynchronous Connection
- Network identifiers, Major Types of Rights Identifiers
- Network logins, Types of Logins and Login Classes, When the System Logs In for You: Network and Batch Logins
- Network
security, Network Security Considerations, Managing Network Security, Establishing a Dynamic Asynchronous Connection
- events audited, Auditing in the Network
- limitations, Security in a Network Environment
- network object configuration, Configuring Network Objects Manually
- requirements for, Requirements for Achieving Security
- Networks
- access
control, Hierarchy of Access Controls
- INBOUND parameter, Establishing a Dynamic Asynchronous Connection
- proxy login for applications, Using Proxy Logins
- NML (network management listener) objects, Summary of Network Objects
- No
Access attribute, No Access Attribute
- Nodes, types of, Establishing a Dynamic Asynchronous Connection
- Non-file-oriented devices, access requirements, Access Requirements for I/O Operations
- None attribute (ACEs), Preventing Users from Accessing an Object, Limiting Access to a Device
- Noninteractive logins, Types of Logins and Login Classes, When the System Logs In for You: Network and Batch Logins
- batch, When the System Logs In for You: Network and Batch Logins
- classes, When the System Logs In for You: Network and Batch Logins
- network, When the System Logs In for You: Network and Batch Logins
- Nopropagate attribute, Copying an ACL, Restoring a File's Default Security Profile, Rules for Assigning a Protection Code and ACL
- Numeric UICs, Format of a UIC
O- Object classes
- descriptions of, Descriptions of Object Classes
- security attributes of, Specifying an Object's Class
- Object ownership
- assigning during file creation, Controlling File Access
- by resource identifiers, Access Requirements
- changing, Owner, Modifying a Security Profile
- exceptions to the rules, Owner
- files, Rules for Assigning Ownership
- managing defaults, Setting Default Protection and Ownership, Controlling File Access
- managing directory defaults, Setting Up the ACL
- qualifying for, Owner
- reassigning, Owner
- restoring file defaults, Restoring a File's Default Security Profile
- security element of an object, Contents of an Object's Profile
- zero UICs in protection checks, How the System Determines if a User Can Access a Protected Object
- Object permanence
- capability object, Permanence of the Object
- common event flag cluster, Permanence of the Object
- devices, Permanence of the Object
- global sections, Permanence of the Object
- logical name tables, Permanence of the Object
- queues, Permanence of the Object
- resource domains, Permanence of the Object
- security class object, Permanence of the Object
- volumes, Permanence of the Object
- Objects, Protecting Data
- access
arranged by, Authorization Database Represented as an Access Matrix
- access to, comparing security profiles, Contents of a User's Security Profile
- ACLs and, Access Control List (ACL)
- adding ACEs for security auditing, Adding Security-Auditing ACEs
- alarms for creation, Alarm Messages
- alarms for deaccess, Alarm Messages
- alarms for deletion, Alarm Messages
- auditing
access, Auditing Protected Objects, Enabling Auditing for a Class of Objects, Kinds of System Activity the Operating System Can Report
- capability
class, Capabilities
- changing security profile, Modifying a Security Profile
- characteristics of protected objects, Definition of a Protected Object
- class descriptions, Descriptions of Object Classes
- class specification, Specifying an Object's Class
- class-specific access overrides, Object-Specific Access Considerations
- classes of, Specifying an Object's Class
- classes protected by operating system, Specifying an Object's Class, Descriptions of Object Classes
- controlling access with Identifier ACEs, Using Identifier Access Control Entries (ACEs), Limiting Access to a Device
- displaying default protection and ownership, Setting Defaults for Objects Other Than Files
- displaying security profiles, Displaying a Security Profile
- global sections, Global Sections
- granting access through protection codes, Controlling Access with Protection Codes
- in security
models, Reference Monitor Concept
- kinds of events audited, Kinds of Events the System Audits
- logical name tables, Logical Name Tables
- managing
default protection and ownership, Setting Default Protection and Ownership
- modifying class templates, Modifying Class Templates
- protection codes, Protection Code, Controlling Access with Protection Codes
- queues, Queues
- reassigning ownership, Owner
- resource domains, Resource Domains
- role in security models, Objects
- rules for
determining access, How the System Determines if a User Can Access a Protected Object
- security class, Security Classes
- security elements source, Contents of an Object's Profile
- security management overview, Descriptions of Object Classes
- security profiles, Security Profile of Objects, Access Required to Modify a Profile
- volumes, Volumes
- OPCOM
(operator communication manager), security auditing and, Disabling and Reenabling Startup of the Audit Server
- Open accounts, Password Requirements for Different Types of Accounts
- captive accounts and, Qualifiers Required to Define Captive Accounts
- captive
recommendation, Password Protection Checklist
- Open files
and ACL consumption of memory, Designing ACLs
- OpenSSL, Secure Sockets Layer (SSL)
- OpenVMS Cluster
environments
- building single security domain, Building a Common Environment
- managing audit log file, Managing the Audit Log File
- protected object databases, Storing Profiles and Auditing Information
- security considerations, Securing a Cluster
- security implementation, Using the System Management Utility
- synchronizing authorization data, Synchronizing Authorization Data
- system file recommendations, Recommended Common System Files
- system file requirements, Required Common System Files
- OpenVMS Cluster
environments, protected objects, Protecting Objects
- OPER privilege, OPER Privilege (System)
- overriding access controls, How the System Determines if a User Can Access a Protected Object
- queue access, Object-Specific Access Considerations
- queue management, Privilege Requirements
- Owner
- category of user access, Format of a Protection Code
P- Paper shredders, Disposing of Hardcopy Output
- Password
generators
- obtaining initial password, Primary Passwords
- when to require, Generated Passwords
- Password grabber programs, Guidelines for Protecting Your Password, Using the Secure Server
- catching with auditing ACEs, Attaching a Security-Auditing ACE
- Password history, History Lists
- Password
protection, Guidelines for Protecting Your Password, Password Protection Checklist
- Password
synchronization, Password Synchronization
- Passwords
- acceptable, Observing System Restrictions on Passwords
- automatically
generated, Selecting Your Own Password, Using Generated Passwords
- avoiding
detection, Using Generated Passwords, Unsuccessful Intrusion Attempts, Identifying the Perpetrator
- chances
to supply during dialups, Failing to Enter the Correct Password During a Dialup Login
- changing, Changing Your Password, Selecting Your Own Password
- at login, Changing Your Password As You Log In
- expired, Changing an Expired Password
- frequency guidelines, Guidelines for Protecting Your Password
- secondary, Changing a Secondary Password
- using /NEW_PASSWORD qualifier, Changing Your Password As You Log In
- cluster membership management, Managing Cluster Membership
- console passwords, Console Passwords
- dialup
retries, Failing to Enter the Correct Password During a Dialup Login
- dual, Types of Passwords, Types of Passwords
- eliminating for networks, Special Security Measures with Proxy Access
- encoding, Subjects
- encryption algorithms, Site Password Algorithms
- expiration, Password and Account Expiration Times, Changing an Expired Password
- expiration time, Expiring Passwords
- failure
to change, Changing an Expired Password
- first, Obtaining Your Initial Password
- forced change, Changing an Expired Password, Enforcing Change of Expired Password
- format, Choosing a Password for Your Account
- generated, Using Generated Passwords, Primary Passwords
- guessing, Obtaining Your Initial Password
- history
list, Observing System Restrictions on Passwords
- how to preexpire, Primary Passwords
- incorrect, Local Login Messages
- initial, Obtaining Your Initial Password, Primary Passwords
- length, Choosing a Password for Your Account, Obtaining Your Initial Password, Requiring a Minimum Password Length
- lifetime of, Changing Your Password, Changing a Secondary Password
- locked, Password Requirements for Different Types of Accounts, Qualifiers Required to Define Captive Accounts, Generated Passwords
- minimum length, Observing System Restrictions on Passwords, Changing Your Password, Requiring a Minimum Password Length
- multiple systems and, Guidelines for Protecting Your Password
- new, Changing Your Password As You Log In
- null
as choice for captive account, Qualifiers Required to Define Captive Accounts
- open accounts and, Password Requirements for Different Types of Accounts
- password
grabber programs, Guidelines for Protecting Your Password
- primary, Types of Passwords, Entering a Secondary Password, Primary Passwords
- proxy logins, Using Proxy Login Accounts to Protect Passwords
- reason for changing, Observing Your Last Login Time, Additional Events to Audit
- receive, Establishing a Dynamic Asynchronous Connection
- restrictions, Observing System Restrictions on Passwords, Enforcing Minimum Password Standards
- reuse, Choosing a Password for Your Account
- risky, Choosing a Password for Your Account
- routing
initialization, Specifying Routing Initialization Passwords
- screening
- against dictionary, System Dictionary
- against history list, History Lists
- with site-specific filter, Site-Specific Filters
- secondary, Types of Passwords, Secondary Passwords
- advantages, Secondary Passwords
- changing, Changing a Secondary Password
- changing expired, Changing an Expired Password
- entering, Entering a Secondary Password
- managing, Secondary Passwords
- secure, Choosing a Password for Your Account
- secure choices for, Choosing a Password for Your Account
- secure terminal servers and, Guidelines for Protecting Your Password
- sharing, Guidelines for Protecting Your Password, Sharing Files in a Network
- system, Types of Passwords, Entering a System Password, System Passwords
- causing login failures, Using a Terminal That Requires a System Password
- dictionary, Observing System Restrictions on Passwords
- disadvantages, System Passwords
- guidelines, System Passwords
- minimum length requirement, Requiring a Minimum Password Length
- modifying, System Passwords
- recommended change frequency, Expiring Passwords
- setting up, System Passwords
- transmit, Establishing a Dynamic Asynchronous Connection
- types, Knowing What Type of Password to Use
- uniqueness for each account, Guidelines for Protecting Your Password
- user, Subjects, Knowing What Type of Password to Use
- user guidelines, Choosing a Password for Your Account
- verifying
change of, Selecting Your Own Password
- when account is created, Obtaining Your Initial Password
- when
to change, Obtaining Your Initial Password
- Performance
- ACL length and, Designing ACLs
- high-water marking and, Prevention Through High-Water Marking
- security-auditing impact, Considering the Performance Impact
- PFMGBL privilege, Privilege Requirements
- PFNMAP privilege, Privilege Requirements, PFNMAP Privilege (All)
- PHONE objects, Summary of Network Objects
- PHY_IO privilege, Privilege Requirements, PHY_IO Privilege (All)
- Physical I/O
access, Types of Access
- Physical security, Building a Secure System Environment
- restricting system access, Controlling Access to System Data and Resources
- violation indicators, Reports from Users
- when logging out, Logging Out Without Compromising System Security, Clearing Your Terminal Screen
- PIPE command,
impact on subprocess auditing events, Considering the Performance Impact
- PIPE subprocess, analyzing audit messages, Recommended Procedure
- Plaintext, Encryption Process
- Port, terminal, Establishing a Dynamic Asynchronous Connection
- Primary passwords, Types of Passwords
- Printers
- default security elements, Template Profile
- Privilege
requirements
- common event flag clusters, Privilege Requirements
- devices, Privilege Requirements
- global sections, Privilege Requirements
- logical name tables, Privilege Requirements
- queues, Privilege Requirements
- resource domains, Privilege Requirements
- volumes, Privilege Requirements
- Privileged
accounts, Privileged Accounts, Limiting User Privileges
- Privileges
- ACNT, ACNT Privilege (Devour)
- affecting
object access, How the System Determines if a User Can Access a Protected Object
- All category, Categories of Privilege
- ALLSPOOL, ALLSPOOL Privilege (Devour)
- ALTPRI, ALTPRI Privilege (System)
- AUDIT, AUDIT Privilege (System)
- auditing
use of, Additional Events to Audit, Kinds of System Activity the Operating System Can Report
- authorized process, Privileges, Giving Users Privileges
- BUGCHK, BUGCHK Privilege (Devour)
- BYPASS, How the System Determines if a User Can Access a Protected Object, How Privileges Affect Protection Mechanisms, Using Control Access to Modify an Object Profile, BYPASS Privilege (All)
- bypassing
ACLs, How Privileges Affect Protection Mechanisms
- bypassing protection codes, How Privileges Affect Protection Mechanisms
- captive accounts and, Privileged Accounts
- categories of, Giving Users Privileges, Categories of Privilege
- CMEXEC, CMEXEC Privilege (All)
- CMKRNL, CMKRNL Privilege (All)
- default
process, Privileges, Giving Users Privileges
- definition, Privileges
- DETACH, IMPERSONATE Privilege (All) (Formerly DETACH)
- Devour
category, Categories of Privilege
- DIAGNOSE, DIAGNOSE Privilege (Objects)
- disabling, Privileges
- DOWNGRADE, DOWNGRADE Privilege (All)
- enabling through SETPRV, Privileges
- EXQUOTA, EXQUOTA Privilege (Devour)
- file sharing and, Sharing Files in a Network
- GROUP, GROUP Privilege (Group), GRPPRV Privilege (Group)
- Group category, Categories of Privilege
- GRPNAM, GRPNAM Privilege (Devour)
- GRPPRV, How the System Determines if a User Can Access a Protected Object, Format of a Protection Code, How Privileges Affect Protection Mechanisms, Using Control Access to Modify an Object Profile
- IMPERSONATE, IMPERSONATE Privilege (All) (Formerly DETACH)
- IMPORT, IMPORT Privilege (Objects)
- influence on object access, How the System Determines if a User Can Access a Protected Object
- LOG_IO, LOG_IO Privilege (All)
- MOUNT, MOUNT Privilege (Normal)
- NETMBX, NETMBX Privilege (Normal)
- network
requirements, Managing Network Security
- Normal category, Categories of Privilege
- Objects category, Categories of Privilege
- OPER, Object-Specific Access Considerations, OPER Privilege (System)
- PFNMAP, PFNMAP Privilege (All)
- PHY_IO, PHY_IO Privilege (All)
- PRMCEB, PRMCEB Privilege (Devour)
- PRMGBL, PRMGBL Privilege (Devour)
- PRMMBX, PRMMBX Privilege (Devour)
- process, Assigning Privileges
- PSWAPM, PSWAPM Privilege (System)
- READALL, How the System Determines if a User Can Access a Protected Object, How Privileges Affect Protection Mechanisms, READALL Privilege (Objects)
- recommendations
for different users, Suggested Privilege Allocations
- related
to group UIC, Designing User Groups
- reporting
use with $CHECK_PRIVILEGE, Sources of Event Information
- requirements
- common event flag clusters, Privilege Requirements
- devices, Privilege Requirements
- global sections, Privilege Requirements
- logical name tables, Privilege Requirements
- queues, Privilege Requirements
- resource domains, Privilege Requirements
- volumes, Privilege Requirements
- SECURITY, SECURITY Privilege (System)
- security
administrator requirements, Account Requirements for a Security Administrator
- SET
PROCESS/PRIVILEGES, Privileges
- SETPRV, SETPRV Privilege (All)
- SHARE, SHARE Privilege (All)
- SHMEM, SHMEM Privilege (Devour)
- storage in UAF record, Giving Users Privileges
- summary
of, Categories of Privilege, Assigning Privileges
- SYSGBL, SYSGBL Privilege (Files)
- SYSLCK, SYSLCK Privilege (System)
- SYSNAM, SYSNAM Privilege (All)
- SYSPRV, How the System Determines if a User Can Access a Protected Object
- controlling access through, Using Control Access to Modify an Object Profile
- effect on protection mechanisms, How Privileges Affect Protection Mechanisms
- giving rights of system user, Format of a Protection Code
- tasks requiring, SYSPRV Privilege (All)
- System
category, Categories of Privilege
- TMPMBX, TMPMBX Privilege (Normal)
- UAF
records and, Privileges
- UPGRADE, UPGRADE Privilege (All)
- VOLPRO, VOLPRO Privilege (Objects)
- WORLD, WORLD Privilege (System)
- PRMCEB privilege, Privilege Requirements, PRMCEB Privilege (Devour)
- PRMGBL
privilege, PRMGBL Privilege (Devour)
- PRMMBX privilege, Privilege Requirements, PRMMBX Privilege (Devour)
- Probers,
catching, Monitoring the System, Security Auditing
- Probing, as
security problem, Types of Computer Security Problems
- Process exclusion list, Preventing Process Suspension
- Processes
- access
rights of, Protecting Data
- activities permitted by privileges, Giving Users Privileges
- adding to exclusion list, Preventing Process Suspension
- audit server, Tasks Performed by the Audit Server
- auditing of, Modifying a User Authorization Record, Kinds of System Activity the Operating System Can Report
- auditing
system services controlling, Kinds of System Activity the Operating System Can Report
- connecting restrictions, Local Login Messages
- creating
with different UICs, How Your Process Acquires a UIC
- default
protection for, Rules for Assigning a Protection Code and ACL
- disconnected, Local Login Messages, Removing Disconnected Processes
- displaying default protection, Rules for Assigning a Protection Code and ACL
- displaying process rights identifiers, Displaying the Rights Identifiers of Your Process
- enabling privileges, Privileges
- interactive
mode, Types of Logins and Login Classes
- logging out of current, Removing Disconnected Processes
- modifying the rights list, Modifying a System or Process Rights List
- reconnecting, Local Login Messages
- security
profiles of, Contents of a User's Security Profile
- suspending, Preventing Process Suspension
- UIC identifiers, How Your Process Acquires a UIC
- Project accounts, Setting Up the Resource Identifier
- as protected subsystems, Applications for Protected Subsystems
- setting up, Setting Up the Directory of a Resource Identifier
- Prompts, passwords
and, Entering a System Password
- Propagating protection,
example, Admitting Remote Users to Multiple Accounts
- Protected attribute, Copying an ACL, Restoring a File's Default Security Profile
- deleting ACEs with, Deleting an ACL
- Protected object
databases, Storing Profiles and Auditing Information
- Protected subsystems
- advantages of, Using Protected Subsystems, Advantages of Protected Subsystems
- applications for, Applications for Protected Subsystems
- constructing, Building the Subsystem
- description of, How Protected Subsystems Work, Giving Users Access
- design requirements, Design Considerations
- enabling, Enabling Protected Subsystems on a Trusted Volume
- example, Example of a Protected Subsystem
- file protection, Protecting Subsystem Directories, Protecting the Images and Data Files
- mounting volumes with, Enabling Protected Subsystems on a Trusted Volume
- printer protection, Protecting the Printer
- subsystem ACEs, Building the Subsystem
- system management requirements, System Management Requirements
- user access, Giving Users Access
- Protection
- ACL-based, Setting Defaults for a Directory Owned by a Resource Identifier
- capability, Template Profile
- command procedures and, Potentially Harmful Programs
- common event flag clusters, Template Profile
- deleted
data, Protecting Information When Disk Space Is Reassigned, Overwriting Disk Blocks, Setting a High-water Mark
- devices, Template Profile
- global sections, Template Profile
- logical name tables, Template Profile
- managing
defaults, Setting Default Protection and Ownership, Controlling File Access
- objects, Security Profile of Objects
- queues, Template Profile
- resource domains, Template Profile
- security class, Template Profile
- through
protected subsystems, Using Protected Subsystems
- UIC-based codes, Protection Code
- volumes, Template Profile
- Protection checking, How the System Determines if a User Can Access a Protected Object
- evaluating an object access request, How the System Determines if a User Can Access a Protected Object
- exception with zero UICs, How the System Determines if a User Can Access a Protected Object
- influenced by ownership, Controlling File Access
- Protection codes, Protection for OpenVMS System Files
- access specification, Types of Access in a Protection Code
- access types, Format of a Protection Code
- assigning during file creation, Controlling File Access
- bypassing with special rights, Understanding Privileges and Control Access
- changing, Changing a Protection Code
- default file protection, Providing a Default Protection Code for a Directory Structure, Adjusting Protection Defaults
- definition, Authorization Database, Protection Code
- denying all access, Enhancing Protection for Sensitive Objects
- effect of privileges, How the System Determines if a User Can Access a Protected Object
- evaluation sequence, Protection Code
- format, Controlling Access with Protection Codes
- granting control access, Types of Access in a Protection Code
- Identifier ACEs and, Preventing Users from Accessing an Object
- interaction with ACLs, Enhancing Protection for Sensitive Objects
- interpreting, Protection Code
- multiple user categories and, Processing a Protection Code
- null access specification, Format of a Protection Code
- priority in access evaluation, How the System Determines if a User Can Access a Protected Object
- processing, Processing a Protection Code
- queue access rights, Types of Access
- reading, Processing a Protection Code
- restoring file default, Restoring a File's Default Security Profile
- security element of an object, Contents of an Object's Profile
- sequence of checking categories, Processing a Protection Code
- user categories, Protection Code
- Protocols
- autodial/master, Establishing a Dynamic Asynchronous Connection
- Protocols, autodial/nomaster, Establishing a Dynamic Asynchronous Connection
- Proxies
- access control
- removing, Removing Proxy Access
- Proxy access, Using Proxy Logins
- access control, Hierarchy of Access Controls
- removing, Removing Proxy Access
- setting up a proxy database for, Setting Up a Proxy Database
- to
applications, Enabling and Disabling Incoming Proxy Access
- to
nodes, Enabling and Disabling Incoming Proxy Access
- Proxy
accounts, Using Proxy Login Accounts to Protect Passwords, Using Proxy Logins, Using DECnet Application (Object) Accounts
- as captive accounts, Procedure for Creating a Proxy Account
- as restricted accounts, Proxy Accounts
- default, Using Proxy Login Accounts to Protect Passwords
- example, Example of a Proxy Account, Admitting Remote Users to Multiple Accounts
- general-access, Using Proxy Login Accounts to Protect Passwords
- maximum number allowed, Using Proxy Login Accounts to Protect Passwords
- multiple-user, Using Proxy Login Accounts to Protect Passwords
- naming, Using Proxy Login Accounts to Protect Passwords
- recommended restrictions, Procedure for Creating a Proxy Account
- selecting from multiple, Using Proxy Login Accounts to Protect Passwords
- single-user, Using Proxy Login Accounts to Protect Passwords
- Proxy database, Setting Up a Proxy Database
- setting up, Setting Up a Proxy Database
- Proxy logins, When the System Logs In for You: Network and Batch Logins, Using Proxy Login Accounts to Protect Passwords, Using Proxy Logins
- access
control, Using Proxy Logins
- account, Using Proxy Logins
- establishing
and managing, Proxy Access Control, Special Security Measures with Proxy Access
- NET$PROXY.DAT, Setting Up a Proxy Database
- NETPROXY.DAT, Setting Up a Proxy Database
- network applications, Using Proxy Logins
- security benefits, Using Proxy Login Accounts to Protect Passwords
- PSWAPM
privilege, PSWAPM Privilege (System)
- PURGE command, /ERASE qualifier, Overwriting Disk Blocks
Q- Queues
- access granted
by OPER privilege, Object-Specific Access Considerations
- ACL access
rights, Types of Access
- as protected objects, Classes of Protected Objects
- events audited, Kinds of Auditing Performed
- privilege requirements, Privilege Requirements
- profile
storage, Permanence of the Object
- protection code access rights, Types of Access
- security elements of, Queues
- template profiles, Template Profile
- types of
access, Types of Access
R- Read access
- devices, Types of Access
- files, Types of Access
- global sections, Types of Access
- granting
through ACLs, Establishing an Inheritance Scheme for Files
- granting through protection
codes, Format of a Protection Code
- logical name tables, Types of Access
- queues
- through
ACLs, Types of Access
- through
protection codes, Types of Access
- resource domains, Types of Access
- security class, Types of Access
- volumes, Types of Access
- READALL privilege, How the System Determines if a User Can Access a Protected Object, How Privileges Affect Protection Mechanisms, READALL Privilege (Objects)
- Recall buffers, Protecting Information in Access Control Strings
- RECALL command, /ERASE qualifier, Protecting Information in Access Control Strings
- Receive passwords, Establishing a Dynamic Asynchronous Connection
- Reconnection
to processes, Limiting Disconnected Processes
- Records displaying
holder of a rights identifier, Displaying the Database
- Reference
monitors, Structure of a Secure Operating System
- applying to networks, Requirements for Achieving Security
- concept in security, Structure of a Secure Operating System, Reference Monitor
- implementation, Implementation of the Reference Monitor
- requirements on, How the Reference Monitor Enforces Security Rules
- Remote identifiers, Major Types of Rights Identifiers
- Remote logins, Logging In Interactively: Local, Dialup, and Remote Logins
- logging
out, Clearing Your Terminal Screen
- system passwords and, System Passwords
- REMOVE/IDENTIFIER
command in Authorize utility, Removing Identifiers
- Removing
proxy access, Removing Proxy Access
- RENAME command
- /INHERIT_SECURITY qualifier, Using the COPY and RENAME Commands
- RENAME command, /INHERIT_SECURITY qualifier, Using the COPY and RENAME Commands
- Reserved UIC
group numbers, Format of a UIC
- Resource
attribute, Resource Attribute, Setting Up the Resource Identifier
- Resource attributes, Resource Attribute, Setting Up the Resource Identifier
- Resource domains, Classes of Protected Objects
- events audited, Kinds of Auditing Performed
- privilege requirements, Privilege Requirements
- profile storage, Permanence of the Object
- security elements of, Resource Domains
- template profile, Template Profile
- types of access, Types of Access
- Resource identifiers, Setting Up the Resource Identifier
- as file owners, Rules for Assigning a Protection Code and ACL
- Resource
monitoring, Error Handling in the Auditing Facility
- disabling, Disabling Disk Monitoring
- Restricted accounts, Password Requirements for Different Types of Accounts, Restricted Accounts
- danger of process spawning, Qualifiers Required to Define Captive Accounts
- setting up, Types of System Accounts
- when to use, Types of System Accounts
- Rights
database
- adding identifiers, Adding Identifiers
- assigning identifiers to users, Assigning Identifiers to Users
- creating and maintaining, Populating the Rights Database
- displaying, Displaying the Database
- removing identifiers and holders, Removing Identifiers
- Rights databases
- adding identifiers, Adding Identifiers
- assigning identifiers to users, Assigning Identifiers to Users
- creating and maintaining, Populating the Rights Database
- displaying, Displaying the Database
- removing identifiers and holders, Removing Identifiers
- Rights list, access arranged by capability, Authorization Database Represented as an Access Matrix
- Rights lists
- access arranged by capability, Authorization Database Represented as an Access Matrix
- Rights of users
- displaying, Displaying the Database
- RIGHTSLIST.DAT files
- auditing, Auditing Categories of Activity
- creating and maintaining, Displaying the Database
- how UICs are stored, Guidelines for Creating a UIC
- RMS_FILEPROT system parameter, Rules for Assigning a Protection Code and ACL, Controlling File Access, Adjusting Protection Defaults
- Routing
initialization passwords, Specifying Routing Initialization Passwords
S- Save
set (BACKUP), protection of, Protecting a Backup Save Set
- Save sets
- encrypting, Encrypting Save Sets
- Screen clearing, Clearing Your Terminal Screen
- Secondary passwords, Types of Passwords
- advantages, Secondary Passwords
- changing, Changing a Secondary Password
- changing expired, Changing an Expired Password
- disadvantages, Types of Passwords
- entering, Entering a Secondary Password
- login expiration, Entering a Secondary Password
- managing, Secondary Passwords
- minimum length, Entering a Secondary Password
- SECSRV$CLIENT, reserved identifier, How Protected Subsystems Work
- SECSRV$COMMUNICATION, reserved identifier, How Protected Subsystems Work
- SECSRV$OBJECT, reserved identifier, How Protected Subsystems Work
- Secure Sockets
Layer (SSL), Secure Sockets Layer (SSL)
- Secure
terminal servers, Guidelines for Protecting Your Password, Using the Secure Server
- password protection and, Guidelines for Protecting Your Password
- Security
- assessing
auditing requirements, Assessing Your Auditing Requirements
- clusterwide
intrusion detection, clusterwide Intrusion Detection
- data protection mechanisms, Security Profile of Objects
- definition of levels, Levels of Security Requirements
- environmental
factors, Building a Secure System Environment
- erasing data on disk, Protecting Information When Disk Space Is Reassigned
- high-water marking, Protecting Information When Disk Space Is Reassigned
- managing auditing, Managing the Auditing Subsystem
- managing default protection
and ownership, Setting Default Protection and Ownership
- objects
protected by system, Specifying an Object's Class
- operating system model, Structure of a Secure Operating System
- optimizing
file security, Suggestions for Optimizing File Security
- performance impact
- auditing, Considering the Performance Impact
- Trojan horse programs, Suggestions for Optimizing File Security
- Security
administrators
- checklist for maintaining a secure
system, Ongoing Tasks to Maintain a Secure System
- cluster managers and, Securing a Cluster
- goals of, Understanding System Security
- personal accounts, Account Requirements for a Security Administrator
- privilege requirements, Account Requirements for a Security Administrator
- role of, Role of a Security Administrator
- system passwords and, Entering a System Password
- training users, Checklist for Contributing to System Security, Training the New User
- Security alarms, Asking Your Security Administrator to Enable Auditing
- disabling on system consoles, Enabling a Terminal to Receive Alarms
- events to enable as, Auditing Categories of Activity, Selecting a Destination for the Event Message
- events triggering, Additional Events to Audit
- example of enabling events, Assessing Your Auditing Requirements
- sample messages, Overview of the Auditing Process, Alarm Messages
- Security
archive files
- losing the remote link to, Losing the Link to a Remote Log File
- Security archive
files, losing the remote link to, Losing the Link to a Remote Log File
- Security attacks, forms of, Types of Computer Security Problems, Forms of System Attacks
- Security audit event messages
- changing disk transfer rate, Adjusting the Transfer of Messages to Disk
- controlling delivery to server, Choosing the Number of Outstanding Messages That Trigger Process Suspension
- delaying delivery at startup, Changing the Point in Startup When the Operating System Initiates Auditing
- when to ignore, Recommended Procedure
- Security
audit log files, Audit Trail, Auditing File Access
- advantages of, Selecting a Destination for the Event Message
- allocating disk space, Allocating Disk Space for the Audit Log File
- changing location, Moving the File from the System Disk
- changing message transfer rate, Adjusting the Transfer of Messages to Disk
- characteristics, Using an Audit Log File
- creating, Maintaining the File
- description, Using an Audit Log File
- events to report, Selecting a Destination for the Event Message
- interactive analysis, Using the Audit Analysis Utility Interactively
- maintaining, Maintaining the File
- pre-extending, Disabling Disk Monitoring
- procedures, Using an Audit Log File
- selecting records from, Providing Report Specifications
- Security audit reports, Analyzing a Log File, Examining the Report
- analyzing suspicious activity, Recommended Procedure
- brief format, Brief Audit Report
- creating, Recommended Procedure
- defining contents of, Providing Report Specifications
- destination, Qualifiers for the Audit Analysis Utility
- detailed inspection, Examining the Report
- examples, Providing Report Specifications, Examining the Report
- formats, Qualifiers for the Audit Analysis Utility
- full format, One Record from a Full Audit Report
- rights identifiers in, How Rights Identifiers Appear in the Audit Trail
- routine inspections, Recommended Procedure
- scheduling, Recommended Procedure
- summary format, Summary of Events in an Audit Log File
- Security auditing, Auditing Access to Your Account and Files, Security Auditing
- account and file access, Auditing Access to Your Account and Files
- adding ACEs to files, Adding Access Control Entries to Sensitive Files
- analyzing audit log
files, Analyzing a Log File
- archive files, Using a Remote Log File
- assessing site requirements, Assessing Your Auditing Requirements
- audit listener mailboxes, Using a Listener Mailbox
- audit server databases, Tasks Performed by the Audit Server
- audit trails, Audit Trail
- capability objects, Kinds of Auditing Performed
- cluster considerations, Managing the Audit Log File
- common event flag clusters, Kinds of Auditing Performed
- controlling event messages, Choosing the Number of Outstanding Messages That Trigger Process Suspension
- default auditing events, Audit Trail
- default characteristics, Tasks Performed by the Audit Server
- devices, Kinds of Auditing Performed
- directories, Kinds of Auditing Performed
- disabling auditing, Disabling and Reenabling Startup of the Audit Server
- disabling events, Auditing Categories of Activity
- disabling resource monitoring, Disabling Disk Monitoring
- effective use, Recommended Procedure
- enabling auditing, Disabling and Reenabling Startup of the Audit Server
- enabling event classes, Auditing Categories of Activity
- enabling events, Ways to Generate Audit Information
- error handling, Allocating Disk Space for the Audit Log File, Error Handling in the Auditing Facility
- excluding processes from suspension, Preventing Process Suspension
- files, Adding Access Control Entries to Sensitive Files, Kinds of Auditing Performed
- global sections, Kinds of Auditing Performed
- granularity of events, Enabling Auditing for a Class of Objects
- high security needs, Levels of Security Requirements, Assessing Your Auditing Requirements
- logical name tables, Kinds of Auditing Performed
- low security needs, Levels of Security Requirements, Assessing Your Auditing Requirements
- managing the audit server, Managing the Auditing Subsystem
- memory limitations and, Reacting to Insufficient Memory
- messages, Auditing File Access
- moderate security needs, Levels of Security Requirements, Assessing Your Auditing Requirements, Auditing Events for a Site with Moderate Security Requirements
- object class enabled, Enabling Auditing for a Class of Objects
- overview, Overview of the Auditing Process
- performance impact, Considering the Performance Impact
- queues, Kinds of Auditing Performed
- reporting object access, Auditing Protected Objects
- reporting object use, How Rights Identifiers Appear in the Audit Trail
- resource domains, Kinds of Auditing Performed
- security class objects, Kinds of Auditing Performed
- sending event messages to archive files, Using a Remote Log File
- sending event messages to mailboxes, Using a Listener Mailbox
- sending event messages to operator terminals, Enabling a Terminal to Receive Alarms
- synchronizing cluster time, Maintaining the Accuracy of Message Time-Stamping
- volumes, Kinds of Auditing Performed
- Security
breaches, handling, Understanding System Security, Handling a Security Breach
- Security
checklists
- for designing a secure system, Summary: System Security Design
- for maintaining a
secure system, Ongoing Tasks to Maintain a Secure System
- for training users, Training the New User
- for users, Checklist for Contributing to System Security
- Security class
object, Security Classes, Permanence of the Object
- definition, Classes of Protected Objects
- events audited, Kinds of Auditing Performed
- profile storage, Permanence of the Object
- template profile, Template Profile
- types of access, Types of Access
- Security
features
- access controls, Protecting Data, Managing System Access
- account duration, Password and Account Expiration Times, Renewing an Expired Account, Restricting Account Duration
- auditing, Adding Access Control Entries to Sensitive Files, Security Auditing, Security Auditing
- automatic password generation, Selecting Your Own Password, Primary Passwords
- dialup retries, Failing to Enter the Correct Password During a Dialup Login
- erase-on-allocate, Prevention Through High-Water Marking
- erase-on-delete, Erasing Techniques
- erasure patterns, Overwriting Disk Blocks
- high-water marking, Prevention Through High-Water Marking
- intrusion detection, Knowing When Break-In Evasion Procedures Are in Effect, Secondary Passwords
- login class restrictions, Observing Your Login Class Restrictions, Restricting Work Times
- password changes, Changing Your Password
- password expiration, Password and Account Expiration Times, Expiring Passwords
- password protection, Guidelines for Protecting Your Password, Password Protection Checklist
- password requirements, Password Requirements for Different Types of Accounts, Requiring a Minimum Password Length
- password restrictions, Observing System Restrictions on Passwords, Using Passwords to Control System Access
- passwords, Using Passwords to Control System Access, Password Protection Checklist
- protected subsystems, Using Protected Subsystems
- proxy accounts, Using DECnet Application (Object) Accounts
- proxy logins, Using Proxy Login Accounts to Protect Passwords, Proxy Access Control
- secondary passwords, Entering a Secondary Password, Changing a Secondary Password
- secure terminal servers, Guidelines for Protecting Your Password, Using the Secure Server
- security alarms, Asking Your Security Administrator to Enable Auditing
- shift restrictions, Using an Account Restricted to Certain Days and Times
- system passwords, Entering a System Password, Using a Terminal That Requires a System Password
- Security kernel, definition, How the Reference Monitor Enforces Security Rules
- Security levels, Levels of Security Requirements, Building a Secure System Environment
- event monitoring and, Assessing Your Auditing Requirements
- high, Levels of Security Requirements, Observing Your Last Login Time
- low, Levels of Security Requirements, Observing Your Last Login Time
- medium, Levels of Security Requirements
- Security management, Role of a Security Administrator
- for clusters, Building a Common Environment, Required Common System Files, Recommended Common System Files
- managing audit log file, Managing the Audit Log File
- modifying cluster group number, Managing Cluster Membership
- modifying cluster password, Managing Cluster Membership
- policy development, Levels of Security Requirements, Role of a Security Administrator, System Security Breaches
- protected objects
- cluster-visible, Protecting Objects
- databases, Storing Profiles and Auditing Information
- synchronizing authorization data, Synchronizing Authorization Data
- SYSMAN requirements, Using the System Management Utility
- Security models, Structure of a Secure Operating System
- Security operator terminals, Enabling a Terminal to Receive Alarms
- SECURITY privilege, SECURITY Privilege (System)
- hidden ACEs and, Displaying ACLs
- Security
problems
- anonymity of network and dialup users, Restricting Modes of Operation
- autologin accounts, reducing, Automatic Login Accounts
- categories of, Types of Computer Security Problems
- disk scavenging, Protecting Information When Disk Space Is Reassigned
- hardcopy terminal output, Disposing of Hardcopy Output
- logging out, Logging Out Without Compromising System Security, Clearing Your Terminal Screen
- network access control strings, Protecting Information in Access Control Strings
- password detection, Using Generated Passwords
- telephone system as, Identifying the Successful Perpetrator
- Security profiles
- assigning to new devices, Setting Up Profiles for New Devices
- capability object, Template Profile
- common event flag clusters, Template Profile
- devices, Template Profile
- displaying class defaults, Displaying Class Defaults
- files, Restoring a File's Default Security Profile, Files, Profile Assignment
- global sections, Template Profile
- in access evaluations, How the System Determines if a User Can Access a Protected Object
- logical name tables, Template Profile
- modification requirements, Access Required to Modify a Profile, Using Control Access to Modify an Object Profile
- objects, Security Profile of Objects
- ACLs, Access Control List (ACL)
- changing, Modifying a Security Profile
- contents, Contents of an Object's Profile
- deleting ACLs, Deleting an ACL
- displaying, Displaying a Security Profile
- modifying class templates, Modifying Class Templates
- origin of, Contents of an Object's Profile
- owner element, Owner
- protection codes, Protection Code, Controlling Access with Protection Codes
- processes, Contents of a User's Security Profile
- displaying, Displaying the Rights Identifiers of Your Process
- identifiers, Rights Identifiers
- privileges, Privileges
- UICs, User Identification Code (UIC)
- queues, Template Profile
- resource domains, Template Profile
- security class, Template Profile
- users, Contents of a User's Security Profile
- displaying, Displaying the Rights Identifiers of Your Process
- identifiers, Rights Identifiers
- privileges, Privileges
- UICs, User Identification Code (UIC), How Your Process Acquires a UIC
- volumes, Template Profile
- Security restrictions
- captive command procedures, Guidelines for Captive Command Procedures
- login class, Observing Your Login Class Restrictions
- on command usage, Restricting DCL Command Usage
- on mode of operation, Restricting Modes of Operation
- shifts, Using an Account Restricted to Certain Days and Times, Restricting Work Times
- time-of-day, Using an Account Restricted to Certain Days and Times, Restricting Work Times
- Security
Server process, Security Server Process
- Security, clusterwide intrusion detection, clusterwide Intrusion Detection
- Security-auditing ACEs
- position in ACL, Displaying ACLs
- Security-auditing
events, Additional Events to Audit
- based on security needs, Assessing Your Auditing Requirements
- classes of, Kinds of System Activity the Operating System Can Report
- default classes, Overview of the Auditing Process, Auditing Categories of Activity, Assessing Your Auditing Requirements
- disabling all classes, Assessing Your Auditing Requirements
- displaying, Auditing Categories of Activity
- enabling all classes, Assessing Your Auditing Requirements
- enabling as alarms, Assessing Your Auditing Requirements
- enabling as audits, Assessing Your Auditing Requirements
- example, Auditing Categories of Activity
- network, Auditing in the Network
- reporting, Auditing Categories of Activity, Selecting a Destination for the Event Message, Methods of Capturing Event Messages
- sending to audit log files, Using an Audit Log File
- sending to listener mailboxes, Using a Listener Mailbox
- sending to operator terminals, Enabling a Terminal to Receive Alarms
- sending to remote archive files, Using a Remote Log File
- suppressing privilege audits, Suppression of Certain Privilege Audits
- suppressing process control audits, Suppression of Certain Process Control Audits
- system services for, Sources of Event Information
- SECURITY.AUDIT$JOURNAL files, Invoking the Audit Analysis Utility
- SECURITY_POLICY
system parameter, Storing Profiles and Auditing Information
- Servers
- audit, Tasks Performed by the Audit Server
- secure terminals, Guidelines for Protecting Your Password
- security, Security Server Process
- SET AUDIT command
- /EXCLUDE qualifier, Preventing Process Suspension
- /INTERVAL qualifier, Adjusting the Transfer of Messages to Disk
- /LISTENER qualifier, Using a Listener Mailbox
- /SERVER qualifier, Reacting to Insufficient Memory, Adjusting the Transfer of Messages to Disk
- /THRESHOLD qualifier, Allocating Disk Space for the Audit Log File
- alarms, Alarm Messages
- enabling security-relevant
events, Auditing Categories of Activity
- opening new log files, Maintaining the File
- suggested auditing applications, Security Auditing
- SET FILE
command, /ERASE qualifier, Overwriting Disk Blocks
- SET HOST command, Logging In Interactively: Local, Dialup, and Remote Logins
- SET HOST/DTE command, using over the
network, Establishing a Dynamic Asynchronous Connection
- SET PASSWORD command, Changing Your Password, Selecting Your Own Password
- /GENERATE qualifier, Using Generated Passwords, Requiring a Minimum Password Length
- /SECONDARY qualifier, Changing a Secondary Password
- /SYSTEM qualifier, System Passwords
- /SYSTEM/GENERATE qualifier, System Passwords
- automatic password generation, Using Generated Passwords
- SET PROCESS
command, /PRIVILEGES qualifier, Privileges, Giving Users Privileges
- SET PROTECTION/DEFAULT command, Controlling File Access
- SET
SECURITY command
- /ACL qualifier, Adding ACEs to an Existing ACL
- adding Identifier ACEs, Using Identifier Access Control Entries (ACEs)
- deleting, Deleting an ACL
- deleting
ACEs, Deleting ACEs from an ACL
- example, Adjusting Protection Defaults
- replacing ACEs, Replacing Part of an ACL
- /AFTER qualifier, Adding ACEs to an Existing ACL
- /CLASS qualifier, Specifying an Object's Class, Limiting Access to a Device
- /CLASS=DEVICE qualifier
- , Restricting Terminal Use
- /COPY_ATTRIBUTE
qualifier, Copying an ACL
- /DEFAULT qualifier, Restoring a File's Default ACL, Setting Up Accounts for Local and Remote Users
- /DELETE qualifier, Deleting ACEs from an ACL
- /LIKE qualifier, Copying an ACL
- /OWNER qualifier, Modifying a Security Profile
- /PROTECTION qualifier, Modifying a Security Profile, Processing a Protection Code
- modifying codes, Changing a Protection Code
- modifying for devices, Restricting Application Terminals and Miscellaneous Devices
- /REPLACE qualifier, Replacing Part of an ACL
- changing object security profile, Modifying a Security Profile
- changing protection codes, Changing a Protection Code
- copying ACLs, Copying an ACL
- creating an ACL, Setting Up the ACL
- deleting ACEs, Deleting ACEs from an ACL
- example, Setting Up Accounts for Local and Remote Users
- managing site defaults, Setting Defaults for Objects Other Than Files
- restoring defaults for files, Restoring a File's Default Security Profile
- setting default file protection, Adjusting Protection Defaults
- SET TERMINAL command
- /DISCONNECT qualifier, Limiting Disconnected Processes
- /HANGUP qualifier, Breaking the Connection to a Dialup Line
- /NOMODEM/SECURE qualifier, Using the Secure Server
- /SECURE qualifier, Using the Secure Server
- /SYSPWD qualifier, System Passwords
- stopping password grabbers, Using the Secure Server
- using over the network, Establishing a Dynamic Asynchronous Connection
- SET
VOLUME command
- /ERASE_ON_DELETE qualifier, Overwriting Disk Blocks, Erasing Techniques
- /NOHIGHWATER_MARKING
qualifier, Setting a High-water Mark, Prevention Through High-Water Marking
- /PROTECTION qualifier, Controlling File Access
- SET VOLUME
command, /ERASE_ON_DELETE qualifier, Overwriting Disk Blocks
- Set-Up key, Clearing Your Terminal Screen
- SETPRV
privilege, SETPRV Privilege (All)
- SHARE
privilege, SHARE Privilege (All)
- Shareable
devices, access requirements, Access Requirements for I/O Operations
- Shared files, considerations for a
cluster system, Synchronizing Authorization Data
- Shift restrictions, Using an Account Restricted to Certain Days and Times
- SHMEM
privilege, SHMEM Privilege (Devour)
- SHOW AUDIT command, Auditing Categories of Activity, Tasks Performed by the Audit Server
- SHOW INTRUSION command, Understanding the Intrusion Database
- SHOW PROCESS command, Displaying the Rights Identifiers of Your Process
- and WORLD privilege, Restricting Command Output
- SHOW
PROTECTION command, Rules for Assigning a Protection Code and ACL
- SHOW SECURITY command, Displaying ACLs
- displaying security profiles of objects, Displaying a Security Profile
- displaying site defaults, Setting Defaults for Objects Other Than Files, Displaying Class Defaults
- displaying the object's class, Specifying an Object's Class
- SHOW USERS command,
disconnected jobs and, Removing Disconnected Processes
- SHOW/IDENTIFIER
command in Authorize utility, Displaying the Database
- SHOW/RIGHTS command in Authorize utility, Displaying the Database
- Sign-on, single, Enabling External Authentication
- Single sign-on, Enabling External Authentication
- Site security, Building a Secure System Environment
- Social engineering as security problem, Types of Computer Security Problems
- SOGW user category abbreviation, Format of a Protection Code
- Spawning processes, security implications
in restricted accounts, Qualifiers Required to Define Captive Accounts
- Spooled devices, access requirements, Access Requirements for I/O Operations
- SSL, Secure Sockets Layer (SSL)
- STARTNET.COM command procedure, Establishing a Dynamic Asynchronous Connection
- Subjects in security models, Reference Monitor Concept, Subjects
- Submit access, Types of Access
- Subprocesses
- analyzing
audit messages, Recommended Procedure
- increase
in auditing events, Considering the Performance Impact
- Subsystem ACEs, System Management Requirements, Building the Subsystem, Enabling Protected Subsystems on a Trusted Volume
- format, Building the Subsystem
- subsystem ACEs, Customizing Identifiers
- Subsystem attribute, Subsystem Attribute
- Surveillance guidelines, Ongoing Tasks to Maintain a Secure System
- Synchronization, password, Password Synchronization
- SYS$ACM system service, ACME Subsystem Overview
- SYS$ANNOUNCE
logical name, Announcement Message
- SYS$NODE logical name, Welcome Message
- SYS$PASSWORD_HISTORY_LIFETIME, History Lists
- SYS$PASSWORD_HISTORY_LIMIT, History Lists
- SYS$SINGLE_SIGNON
logical name, Enabling External Authentication
- SYS$SINGLE_SIGNON
logical name bits, Specifying the SYS$SINGLE_SIGNON Logical Name Bits
- SYS$WELCOME
logical name, Welcome Message
- SYSALF,
ALF (automatic login facility) file, Providing Automatic Login
- SYSECURITY.COM command procedure, Moving the File from the System Disk
- SYSGBL privilege, Privilege Requirements, SYSGBL Privilege (Files)
- SYSLCK privilege, Privilege Requirements, SYSLCK Privilege (System)
- SYSNAM privilege, Privilege Requirements, SYSNAM Privilege (All)
- modifying system operations, Privileges
- overriding access controls, How the System Determines if a User Can Access a Protected Object
- queue management, Privilege Requirements
- SYSPRV privilege, How the System Determines if a User Can Access a Protected Object, How Privileges Affect Protection Mechanisms
- giving rights of system user, Format of a Protection Code
- tasks requiring, SYSPRV Privilege (All)
- SYSTARTUP_VMS.COM
command procedure, Establishing a Dynamic Asynchronous Connection
- System failures
- disposing of hardcopy output, Disposing of Hardcopy Output
- System failures,
disposing of hardcopy output, Disposing of Hardcopy Output
- System
files
- adding
ACLs, Protecting System Files
- Alpha
default protection, Protecting System Files
- auditing
recommendations, Security Auditing
- benefiting from ACLs, Security Auditing
- default
protection, Protecting System Files, Protection for OpenVMS System Files
- protecting, Protecting System Files
- protection codes and ownership, Protection for OpenVMS System Files
- recommended, Recommended Common System Files
- required, Required Common System Files
- System Generation utility (SYSGEN),
auditing parameter modifications, Kinds of System Activity the Operating System Can Report
- System Management utility
(SYSMAN)
- managing clusters, Using the System Management Utility
- modifying cluster security data, Managing Cluster Membership
- modifying LGI parameters, Building a Common Environment
- System
managers
- assessing auditing requirements, Assessing Your Auditing Requirements
- System parameters
- auditing modification of, Kinds of System Activity the Operating System Can Report
- controlling disconnected processes, Limiting Disconnected Processes
- defining system users (security category), Using Control Access to Modify an Object Profile
- System passwords, Types of Passwords
- causing login failures, Using a Terminal That Requires a System Password
- disadvantages, System Passwords
- entering, Entering a System Password
- guidelines, System Passwords
- minimum length requirement, Requiring a Minimum Password Length
- modifying, System Passwords
- recommended change frequency, Expiring Passwords
- setting up, System Passwords
- where stored, System Passwords
- System services, auditing event information, Sources of Event Information
- System users (security category), Protection Code, Using Control Access to Modify an Object Profile
- defining with MAXSYSGROUP
parameter, Format of a Protection Code
- qualifications for, Format of a Protection Code
- Systems
- controlling access to, Types of Logins and Login Classes
- controlling use of, Types of Passwords
- SYSUAF.DAT files
- account expiration, Renewing an Expired Account
- auditing modifications to, Auditing Categories of Activity
- LOCKPWD flag, Password Requirements for Different Types of Accounts
- login class restrictions, Observing Your Login Class Restrictions
- modifications and security audit, Additional Events to Audit, Kinds of System Activity the Operating System Can Report
- normal protection, Password Protection Checklist
- password storage, Subjects
- privileges and, Giving Users Privileges, Assigning Privileges
- recording privileges, Privileges
- synchronization with rights database, Populating the Rights Database
- SYSUAFs (system
user authorization files)
- marking for external
authentication, Enabling External Authentication
T- Tampering with system files, detecting, Security Auditing
- Tapes
- default security elements, Template Profile
- managing
security profiles, Setting Up Profiles for New Devices
- TASK objects, Summary of Network Objects
- Template devices,
security elements of, Setting Up Profiles for New Devices
- Terminal
emulator, Establishing a Dynamic Asynchronous Connection
- Terminal emulators, Establishing a Dynamic Asynchronous Connection
- Terminal lines, Establishing a Dynamic Asynchronous Connection
- Terminals
- breaking
dialup connection, Breaking the Connection to a Dialup Line
- clearing DECwindows screen, Protecting Information in Access Control Strings
- clearing
the screen, Protecting Information in Access Control Strings, Clearing Your Terminal Screen
- controlling access, Types of Passwords, System Passwords
- default security elements, Template Profile
- dialup login, Logging In Interactively: Local, Dialup, and Remote Logins
- failing to respond, Entering a System Password
- hardcopy
- disposing of output, Disposing of Hardcopy Output
- hardcopy, disposing of output, Disposing of Hardcopy Output
- limiting access, Restricting Application Terminals and Miscellaneous Devices
- lines for modems, security of, Configuring Terminal Lines for Modems
- logout
considerations, Clearing Your Terminal Screen
- modifying
security profiles, Setting Up Profiles for New Devices
- port, Establishing a Dynamic Asynchronous Connection
- requiring
a system password, Using a Terminal That Requires a System Password
- security alarms and, Enabling a Terminal to Receive Alarms
- session
logging, Logging a User's Session
- system password
- requirement for, Entering a System Password
- system password, requirement for, Entering a System Password
- usage restrictions, Restricting Terminal Use
- virtual, Local Login Messages, Removing Disconnected Processes, Devices, Limiting Disconnected Processes, Establishing a Dynamic Asynchronous Connection
- Time
- auditing changes to system time, Kinds of System Activity the Operating System Can Report
- synchronizing cluster time, Maintaining the Accuracy of Message Time-Stamping
- Time-of-day login restrictions, Using an Account Restricted to Certain Days and Times
- Time-stamp,
synchronizing in cluster, Maintaining the Accuracy of Message Time-Stamping
- Time-stamps
- synchronizing
in cluster, Maintaining the Accuracy of Message Time-Stamping
- TMPMBX
privilege, TMPMBX Privilege (Normal)
- Training
- for users, importance to security, Training the New User
- Training of users, importance to security, Training the New User
- Trojan horse programs, Suggestions for Optimizing File Security, Potentially Harmful Programs
- TTY_DEFCHAR2 system parameter
- disabling virtual terminals, Limiting Disconnected Processes
- enabling
system passwords for remote logins, System Passwords
- TTY_TIMEOUT
system parameter, setting reconnection time, Limiting Disconnected Processes
U- UAFs (user authorization files), Obtaining Your Initial Password
- auditing modifications to, Auditing Categories of Activity
- enabling auditing through, Ways to Generate Audit Information, Modifying a User Authorization Record
- LOCKPWD flag, Password Requirements for Different Types of Accounts
- login class restrictions, Observing Your Login Class Restrictions
- modifications and security audit, Additional Events to Audit, Kinds of System Activity the Operating System Can Report
- MODIFY user/FLAG=AUDIT, Modifying a User Authorization Record, Considering the Performance Impact
- normal protection, Password Protection Checklist
- password storage, Subjects
- performance impact of enabling auditing, Considering the Performance Impact
- privileges and, Giving Users Privileges, Assigning Privileges
- record of last
login, Observing Your Last Login Time
- recording privileges, Privileges
- synchronization with rights
database, Populating the Rights Database
- UIC
groups
- design limitations, Limitations to UIC Group Design
- designing, Designing User Groups
- impact on user privileges, Designing User Groups
- UIC identifiers
- deleting when employee
leaves, Removing Identifiers
- example, Displaying the Rights Identifiers of Your Process, Ordering ACEs Within a List
- UICs
(user identification codes), Subjects, User Identification Code (UIC)
- adding to rights
database, Populating the Rights Database
- alphanumeric, Format of a UIC
- changing
an object's, Owner
- format, Format of a UIC
- group restrictions, Format of a UIC
- guidelines for creating, Guidelines for Creating a UIC
- numeric, Format of a UIC
- object access evaluations and, How the System Determines if a User Can Access a Protected Object
- process, How Your Process Acquires a UIC
- storage of, Guidelines for Creating a UIC
- uniqueness requirement for clustered systems, Synchronizing Authorization Data
- zero, How the System Determines if a User Can Access a Protected Object
- Unshareable devices,
access requirements, Access Requirements for I/O Operations
- UPGRADE
privilege, UPGRADE Privilege (All)
- Use access, Types of Access
- User accounts, Training the New User
- security
considerations, Assigning Appropriate Accounts to Users
- User authorization
- account expiration, Renewing an Expired Account
- login class restrictions, Observing Your Login Class Restrictions
- privilege use, Privileges
- shift restrictions, Using an Account Restricted to Certain Days and Times
- User irresponsibility
- as security problem, Types of Computer Security Problems
- training as antidote, Training the New User
- User
name mapping, User Name Mapping and Password Verification
- User names
- as identifiers, Subjects, Major Types of Rights Identifiers
- User names
as identifiers, Subjects, Major Types of Rights Identifiers
- User penetration as security problem, Types of Computer Security Problems
- User probing as security problem, Types of Computer Security Problems
- User training, Training the New User
- User-written system services
- replacing
with protected subsystems, Advantages of Protected Subsystems
- Users
- access through
ACEs, Granting Access to Particular Users
- displaying process rights identifiers, Displaying the Rights Identifiers of Your Process
- displaying
rights, Displaying the Database
- file security and, Suggestions for Optimizing File Security
- granting
privileges, Giving Users Privileges
- introduction
to system, Training the New User
- protection
code categories, Format of a Protection Code
- requesting access, How the System Determines if a User Can Access a Protected Object
- security categories of, Protection Code, Format of a Protection Code
- security profiles of, Contents of a User's Security Profile
- setting default object protection, Setting Default Protection and Ownership
- training, Training the New User
V- Verification using two passwords, Secondary Passwords
- Virtual terminals, Limiting Disconnected Processes, Establishing a Dynamic Asynchronous Connection
- disabling, Local Login Messages
- disconnected processes and, Removing Disconnected Processes
- LOCAL device, Devices
- logging out of, Removing Disconnected Processes
- Viruses, Potentially Harmful Programs
- VMS$OBJECTS.DAT file, Storing Profiles and Auditing Information
- Volatile database,
network, Establishing a Dynamic Asynchronous Connection
- Volatile databases
- network, Establishing a Dynamic Asynchronous Connection
- VOLPRO privilege, Privilege Requirements, VOLPRO Privilege (Objects)
- Volumes
- access requirements, Access Requirements for I/O Operations
- as protected
objects, Classes of Protected Objects
- auditing
mounts or dismounts, Kinds of System Activity the Operating System Can Report
- erasing data, Erasing Techniques
- events
audited, Kinds of Auditing Performed
- foreign
- access requirements, Access Requirements for I/O Operations
- privilege
requirements, Privilege Requirements
- profile
storage, Permanence of the Object
- protection, Volumes
- security elements of, Volumes
- template profile, Template Profile
- types of
access, Types of Access
- VT100-series terminals
- clearing screen, Clearing Your Terminal Screen
- VT100-series terminals, clearing screen, Clearing Your Terminal Screen
- VT200-series terminals
- clearing screen, Clearing Your Terminal Screen
- VT200-series terminals, clearing screen, Clearing Your Terminal Screen
W- Weekday login
restrictions, Using an Account Restricted to Certain Days and Times
- Welcome messages, Local Login Messages
- security disadvantages, Welcome Message
- Wildcard characters
- in ADD/IDENTIFIER command, Restoring the Rights Database
- in SHOW/RIGHTS command, Displaying the Database
- Work restrictions, Restricting Work Times
- Workstations
- clearing screen, Clearing Your Terminal Screen
- default security elements, Template Profile
- WORLD
privilege, WORLD Privilege (System)
- impact on SHOW PROCESS command, Restricting Command Output
- World users (security category), Protection Code, Format of a Protection Code
- Write access
- devices, Types of Access
- files, Types of Access, Access Requirements
- global sections, Types of Access
- granting through ACLs, Establishing an Inheritance Scheme for Files
- granting through protection
codes, Format of a Protection Code
- logical
name tables, Types of Access
- resource domains, Types of Access
- security class, Types of Access
- volumes, Types of Access
|