| B | 
  
  
    | 
Backup operations
     | 
  
  
    | 
    general recommendations
     | 
  
  
    | 
    performed from captive privileged account
     | 
  
  
    | 
Backup utility (BACKUP)
     | 
  
  
    | 
    general recommendations
     | 
  
  
    | 
Batch identifiers
     | 
  
  
    | 
Batch jobs
     | 
  
  
    | 
    affected by shift restrictions
     | 
  
  
    | 
    authorization
     | 
  
  
    | 
    password protection and cardreaders
     | 
  
  
    | 
Batch logins
     | 
  
  
    | 
Binary output from Audit Analysis utility
     | 
  
  
    | 
Break-in alarms
     | 
  
  
    | 
Break-in attempts
     | 
  
  
    | 
    auditing #1
     | 
  
  
    | 
    auditing #2
     | 
  
  
    | 
    counteraction through dual passwords
     | 
  
  
    | 
    detecting #1
     | 
  
  
    | 
    detecting #2
     | 
  
  
    | 
    evading
     | 
  
  
    | 
    security audit report and
     | 
  
  
    | 
Break key and secure servers
     | 
  
  
    | 
BUGCHK privilege
     | 
  
  
    | 
Buses, default security elements
     | 
  
  
    | 
BYPASS privilege
     | 
  
  
    | 
    description
     | 
  
  
    | 
    effect on control access
     | 
  
  
    | 
    overriding access controls #1
     | 
  
  
    | 
    overriding access controls #2
     | 
  
  
    | C | 
  
  
    | 
C2 environments
     | 
  
  
    | 
C2 security, systems
     | 
  
  
    | 
    checklist for generating
     | 
  
  
    | 
    criteria
     | 
  
  
    | 
    documentation
     | 
  
  
    | 
    effect of site changes on certification
     | 
  
  
    | 
    object protection and
     | 
  
  
    | 
    physical security requirements
     | 
  
  
    | 
    software not included
     | 
  
  
    | 
    SYSMAN databases
     | 
  
  
    | 
    system parameters
     | 
  
  
    | 
    system startup
     | 
  
  
    | 
Capability-based systems
     | 
  
  
    | 
Capability objects
     | 
  
  
    | 
    as  protected objects
     | 
  
  
    | 
    elements of
     | 
  
  
    | 
    reestablishing profile
     | 
  
  
    | 
    template profile
     | 
  
  
    | 
    types of access
     | 
  
  
    | 
Captive accounts
     | 
  
  
    | 
    command procedures
     | 
  
  
    | 
    Ctrl/Y key sequence and
     | 
  
  
    | 
    disabling mail and notification of delivery
     | 
  
  
    | 
    example of production account
     | 
  
  
    | 
    locked passwords and
     | 
  
  
    | 
    when to use #1
     | 
  
  
    | 
    when to use #2
     | 
  
  
    | 
Card readers, default security elements
     | 
  
  
    | 
Case sensitivity
     | 
  
  
    | 
    in passwords and user names
     | 
  
  
    | 
$CHECK_ACCESS system service, security auditing and
     | 
  
  
    | 
$CHECK_PRIVILEGE system service, reporting privilege use
     | 
  
  
    | 
$CHKPRO system service
     | 
  
  
    | 
    role in access control
     | 
  
  
    | 
    security auditing and
     | 
  
  
    | 
/CLITABLES qualifier #1
     | 
  
  
    | 
/CLITABLES qualifier #2
     | 
  
  
    | 
Cluster environments
     | 
  
  
    | 
    building single security domain
     | 
  
  
    | 
    C2 system restrictions
     | 
  
  
    | 
    managing audit log file
     | 
  
  
    | 
    protected object databases
     | 
  
  
    | 
    protected objects
     | 
  
  
    | 
    security considerations
     | 
  
  
    | 
    security implementation
     | 
  
  
    | 
    synchronizing authorization data
     | 
  
  
    | 
    SYSMAN requirements
     | 
  
  
    | 
    system file recommendations
     | 
  
  
    | 
    system file requirements
     | 
  
  
    | 
Cluster managers and security administrators
     | 
  
  
    | 
Clusterwide intrusion detection
     | 
  
  
    | 
CLUSTER_AUTHORIZE.DAT files #1
     | 
  
  
    | 
CLUSTER_AUTHORIZE.DAT files #2
     | 
  
  
    | 
CMEXEC privilege
     | 
  
  
    | 
CMKRNL privilege
     | 
  
  
    | 
Command mode for Audit Analysis utility, manipulating the display
     | 
  
  
    | 
Command procedures
     | 
  
  
    | 
    access control strings in
     | 
  
  
    | 
    STARTNET.COM
     | 
  
  
    | 
    SYSTARTUP_VMS.COM
     | 
  
  
    | 
Commands, usage restrictions
     | 
  
  
    | 
Common event flag clusters
     | 
  
  
    | 
    as protected objects
     | 
  
  
    | 
    events audited
     | 
  
  
    | 
    privilege requirements
     | 
  
  
    | 
    reestablishing security profile
     | 
  
  
    | 
    security elements of
     | 
  
  
    | 
    system modifications of templates
     | 
  
  
    | 
    template profile
     | 
  
  
    | 
    types of access to
     | 
  
  
    | 
Communications devices
     | 
  
  
    | 
    C2 system requirements
     | 
  
  
    | 
    default security elements
     | 
  
  
    | 
Compilers, restricting use with ACLs
     | 
  
  
    | 
Confidential files, security auditing and
     | 
  
  
    | 
CONNECT command, /LOGOUT qualifier
     | 
  
  
    | 
Connections
     | 
  
  
    | 
    auditing
     | 
  
  
    | 
Connections, auditing of
     | 
  
  
    | 
Console terminals
     | 
  
  
    | 
    C2 system requirements
     | 
  
  
    | 
    C2 systems and
     | 
  
  
    | 
    HSC and C2 system requirements
     | 
  
  
    | 
Consoles, enabling passwords for
     | 
  
  
    | 
Control access
     | 
  
  
    | 
    acquiring #1
     | 
  
  
    | 
    acquiring #2
     | 
  
  
    | 
    acquiring #3
     | 
  
  
    | 
    common event flag clusters
     | 
  
  
    | 
    devices
     | 
  
  
    | 
    files
     | 
  
  
    | 
    global sections
     | 
  
  
    | 
    limitations
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    queues
     | 
  
  
    | 
    resource domains
     | 
  
  
    | 
    security class
     | 
  
  
    | 
    volumes
     | 
  
  
    | 
COPY command
     | 
  
  
    | 
    /PROTECTION qualifier
     | 
  
  
    | 
    security profile assigned
     | 
  
  
    | 
Create access
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    volumes
     | 
  
  
    | 
CREATE/PROXY command in Authorize utility
     | 
  
  
    | 
CREATE/RIGHTS command in Authorize utility
     | 
  
  
    | 
Creator ACEs
     | 
  
  
    | 
    example
     | 
  
  
    | 
    with resource identifiers
     | 
  
  
    | 
Ctrl/B key sequence
     | 
  
  
    | 
Ctrl/Y key sequence and restricted accounts
     | 
  
  
    | D | 
  
  
    | 
Database
     | 
  
  
    | 
    volatile network
     | 
  
  
    | 
Databases
     | 
  
  
    | 
    authorization #1
     | 
  
  
    | 
    authorization #2
     | 
  
  
    | 
    protected objects
     | 
  
  
    | 
    rights
     | 
  
  
    | 
    synchronizing authorization on clustered  systems
     | 
  
  
    | 
DBG$ENABLE_SERVER identifier
     | 
  
  
    | 
    C2 system restriction
     | 
  
  
    | 
DCL commands
     | 
  
  
    | 
    SET HOST/DTE in network operations
     | 
  
  
    | 
    SET TERMINAL in network operations
     | 
  
  
    | 
DCL tables, modifications for security
     | 
  
  
    | 
DDCMP (Digital Data Communications Message Protocol)
     | 
  
  
    | 
    asynchronous driver
     | 
  
  
    | 
Debug server identifier, C2 system restriction
     | 
  
  
    | 
DECamds, software not in C2 evaluation
     | 
  
  
    | 
DECdns distributed name service, not in C2 evaluation
     | 
  
  
    | 
DECnet
     | 
  
  
    | 
    C2 system restrictions
     | 
  
  
    | 
    cluster nodes and
     | 
  
  
    | 
    dynamic asynchronous connection #1
     | 
  
  
    | 
    dynamic asynchronous connection #2
     | 
  
  
    | 
    dynamic asynchronous connection #3
     | 
  
  
    | 
    dynamic asynchronous connection #4
     | 
  
  
    | 
    INBOUND parameter #1
     | 
  
  
    | 
    INBOUND parameter #2
     | 
  
  
    | 
    installing dynamic asynchronous connection #1
     | 
  
  
    | 
    installing dynamic asynchronous connection #2
     | 
  
  
    | 
    network objects #1
     | 
  
  
    | 
    network objects #2
     | 
  
  
    | 
    nonprivileged user name
     | 
  
  
    | 
    receive password #1
     | 
  
  
    | 
    receive password #2
     | 
  
  
    | 
    receive passwords
     | 
  
  
    | 
    transmit password
     | 
  
  
    | 
    transmit passwords
     | 
  
  
    | 
DECnet-Plus for OpenVMS, full names not in C2  evaluation
     | 
  
  
    | 
Decryption
     | 
  
  
    | 
DECwindows screens, clearing #1
     | 
  
  
    | 
DECwindows screens, clearing #2
     | 
  
  
    | 
DECwindows screens, clearing #3
     | 
  
  
    | 
DECwindows software, not in C2 evaluation
     | 
  
  
    | 
Default attribute for ACEs
     | 
  
  
    | 
Default ownership
     | 
  
  
    | 
    for directories
     | 
  
  
    | 
    for files
     | 
  
  
    | 
    for protected objects #1
     | 
  
  
    | 
    for protected objects #2
     | 
  
  
    | 
Default protection
     | 
  
  
    | 
    Alpha system files
     | 
  
  
    | 
    for directories
     | 
  
  
    | 
    for files
     | 
  
  
    | 
    for processes #1
     | 
  
  
    | 
    for processes #2
     | 
  
  
    | 
    for VAX system files
     | 
  
  
    | 
    management
     | 
  
  
    | 
Default Protection ACEs #1
     | 
  
  
    | 
Default Protection ACEs #2
     | 
  
  
    | 
Default Protection ACEs #3
     | 
  
  
    | 
Default Protection ACEs #4
     | 
  
  
    | 
    examples
     | 
  
  
    | 
    generating default file protection #1
     | 
  
  
    | 
    generating default file protection #2
     | 
  
  
    | 
Delete access
     | 
  
  
    | 
    common event flag clusters
     | 
  
  
    | 
    files
     | 
  
  
    | 
    granting through protection codes
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    queues
     | 
  
  
    | 
        through ACLs
     | 
  
  
    | 
        through protection codes
     | 
  
  
    | 
    volumes
     | 
  
  
    | 
DELETE command, /ERASE qualifier
     | 
  
  
    | 
DETACH privilege
     | 
  
  
    | 
Devices
     | 
  
  
    | 
    access requirements
     | 
  
  
    | 
    as protected objects
     | 
  
  
    | 
    controlling access through ACLs
     | 
  
  
    | 
    default security elements
     | 
  
  
    | 
    events audited
     | 
  
  
    | 
    modifying security profiles of
     | 
  
  
    | 
    privilege requirements
     | 
  
  
    | 
    profile storage
     | 
  
  
    | 
    protecting BACKUP save sets
     | 
  
  
    | 
    reusing in C2 systems
     | 
  
  
    | 
    security elements of
     | 
  
  
    | 
    spooled, access requirements
     | 
  
  
    | 
    template security profiles
     | 
  
  
    | 
    terminal configuration
     | 
  
  
    | 
DIAGNOSE privilege
     | 
  
  
    | 
Dialup identifiers
     | 
  
  
    | 
Dialup lines
     | 
  
  
    | 
    connection security
     | 
  
  
    | 
    controlling access to
     | 
  
  
    | 
    using for dynamic asynchronous connection
     | 
  
  
    | 
    using in a public area
     | 
  
  
    | 
Dialup logins
     | 
  
  
    | 
    breaking connections
     | 
  
  
    | 
    controlling retries
     | 
  
  
    | 
    failures
     | 
  
  
    | 
    retries
     | 
  
  
    | 
Directories
     | 
  
  
    | 
    access control through ACLs
     | 
  
  
    | 
    access requirements #1
     | 
  
  
    | 
    access requirements #2
     | 
  
  
    | 
    assigning a security profile
     | 
  
  
    | 
    controlling access to files #1
     | 
  
  
    | 
    controlling access to files #2
     | 
  
  
    | 
    creating
     | 
  
  
    | 
    events audited
     | 
  
  
    | 
    ownership
     | 
  
  
    | 
        by resource identifier
     | 
  
  
    | 
        changing access to files
     | 
  
  
    | 
        setting default
     | 
  
  
    | 
    setting default file protection
     | 
  
  
    | 
    setting file protection
     | 
  
  
    | 
DIRECTORY command, /SECURITY qualifier
     | 
  
  
    | 
Disconnected job messages
     | 
  
  
    | 
DISFORCE_PWD_CHANGE flag
     | 
  
  
    | 
Disk quotas
     | 
  
  
    | 
    as restriction for users
     | 
  
  
    | 
    charging to identifiers
     | 
  
  
    | 
Disk scavenging
     | 
  
  
    | 
    discouraging
     | 
  
  
    | 
    preventing #1
     | 
  
  
    | 
    preventing #2
     | 
  
  
    | 
Disk space
     | 
  
  
    | 
    charging to identifier
     | 
  
  
    | 
    requirements for security audit log file
     | 
  
  
    | 
    usage and charging
     | 
  
  
    | 
Disk volumes
     | 
  
  
    | 
    controlling access
     | 
  
  
    | 
    protecting
     | 
  
  
    | 
    restrictions
     | 
  
  
    | 
Disks
     | 
  
  
    | 
    accessing deleted data
     | 
  
  
    | 
    changing message transfer rate
     | 
  
  
    | 
    default security elements
     | 
  
  
    | 
    erase-on-allocate #1
     | 
  
  
    | 
    erase-on-allocate #2
     | 
  
  
    | 
    erasing #1
     | 
  
  
    | 
    erasing #2
     | 
  
  
    | 
    erasure patterns #1
     | 
  
  
    | 
    erasure patterns #2
     | 
  
  
    | 
    high-water marking #1
     | 
  
  
    | 
    high-water marking #2
     | 
  
  
    | 
    managing security profiles
     | 
  
  
    | 
    protecting after file deletion
     | 
  
  
    | 
DISMOUNT command, alarms
     | 
  
  
    | 
DOWNGRADE privilege
     | 
  
  
    | 
DSE (data security erase)
     | 
  
  
    | 
    tailoring
     | 
  
  
    | 
Dual passwords
     | 
  
  
    | 
Dynamic asynchronous connections
     | 
  
  
    | 
    automatic switching of terminal  line
     | 
  
  
    | 
    connection example
     | 
  
  
    | 
    manual switching of terminal line
     | 
  
  
    | 
    passwords for
     | 
  
  
    | 
    procedure for establishing
     | 
  
  
    | 
    security
     | 
  
  
    | 
    switching of terminal line
     | 
  
  
    | 
    terminating the link
     | 
  
  
    | 
    verifier
     | 
  
  
    | 
Dynamic attribute for identifiers
     |