| M |
|
MAIL.EXE
|
|
reinstalling with privileges
|
|
Mail files, recommended protection for
|
|
MAIL objects, recommended access
|
|
Mail utility (MAIL)
|
|
controlling notification messages
|
|
transferring text files
|
|
Mailboxes
|
|
default protection
|
|
default security elements
|
|
for audit event messages
|
|
modifying security profiles
|
|
privilege requirements
|
|
Maintenance tasks for secure systems
|
|
Manage access
|
|
MAXSYSGROUP system parameter #1
|
|
MAXSYSGROUP system parameter #2
|
|
Media initialization
|
|
access requirements
|
|
restricting with ACLs
|
|
Member numbers in UICs
|
|
Member UIC names
|
|
Memory consumption by ACLs
|
|
Messages
|
|
announcement
|
|
security disadvantages
|
|
auditing
|
|
auditing security-relevant events
|
|
disabling last login
|
|
last successful interactive login
|
|
login
|
|
login failures
|
|
suppressing #1
|
|
suppressing #2
|
|
suppressing last login
|
|
welcome
|
|
MFD (master file directory)
|
|
MIRROR objects
|
|
MME (Media Management Extension), not in C2 evaluation
|
|
Modems
|
|
C2 system requirements
|
|
MODIFY/SYSTEM_PASSWORD command in Authorize utility
|
|
MODIFY user/FLAG=AUDIT command in Authorize utility #1
|
|
MODIFY user/FLAG=AUDIT command in Authorize utility #2
|
|
MOM (maintenance operations module) objects
|
|
MOUNT command, alarms
|
|
MOUNT privilege
|
|
Mounting volumes
|
|
access requirements
|
|
security audits and
|
|
with protected subsystems
|
| N |
|
Name Hidden attribute
|
|
Naming rules
|
|
capability objects
|
|
common event flag clusters
|
|
devices
|
|
files
|
|
global sections
|
|
logical name tables
|
|
queues
|
|
resource domains
|
|
security class
|
|
NCP (Network Control Program)
|
|
auditing database modifications
|
|
NET PASSWORD command
|
|
NET$PROXY.DAT files
|
|
auditing
|
|
NETMBX privilege
|
|
NETPROXY.DAT files
|
|
auditing
|
|
normal protection
|
|
Network access control strings #1
|
|
Network access control strings #2
|
|
Network access control strings #3
|
|
Network access control strings #4
|
|
Network accounts
|
|
DECNET account, removing
|
|
network objects #1
|
|
network objects #2
|
|
Network databases
|
|
Network identifiers
|
|
Network logins #1
|
|
Network logins #2
|
|
Network security
|
|
C2 systems and
|
|
events audited
|
|
limitations
|
|
network object configuration #1
|
|
network object configuration #2
|
|
requirements for
|
|
Networks
|
|
access control
|
|
INBOUND parameter
|
|
proxy login for applications
|
|
NISCS_CONV_BOOT system parameter
|
|
NML (network management listener) objects
|
|
No Access attribute
|
|
Nodes, types of
|
|
Non-file-oriented devices, access requirements #1
|
|
Non-file-oriented devices, access requirements #2
|
|
None attribute (ACEs) #1
|
|
None attribute (ACEs) #2
|
|
Noninteractive logins
|
|
batch
|
|
classes
|
|
network
|
|
Nopropagate attribute #1
|
|
Nopropagate attribute #2
|
|
Nopropagate attribute #3
|
|
Numeric UICs
|
| O |
|
Object classes
|
|
descriptions of
|
|
security attributes of
|
|
Object ownership
|
|
assigning during file creation
|
|
by resource identifiers
|
|
changing #1
|
|
changing #2
|
|
exceptions to the rules
|
|
files
|
|
managing defaults #1
|
|
managing defaults #2
|
|
managing directory defaults
|
|
qualifying for
|
|
reassigning
|
|
restoring file defaults
|
|
security element of an object
|
|
zero UICs in protection checks
|
|
Object permanence
|
|
capability object
|
|
common event flag cluster
|
|
devices
|
|
global sections
|
|
logical name tables
|
|
queues
|
|
resource domains
|
|
security class object
|
|
volumes
|
|
Objects
|
|
access arranged by
|
|
access to, comparing security profiles
|
|
ACLs and
|
|
adding ACEs for security auditing
|
|
alarms for creation
|
|
alarms for deaccess
|
|
alarms for deletion
|
|
auditing access #1
|
|
auditing access #2
|
|
auditing access #3
|
|
C2 systems and
|
|
capability class
|
|
changing security profile
|
|
characteristics of protected objects
|
|
class descriptions
|
|
class-specific access overrides
|
|
class specification
|
|
classes of
|
|
classes protected by operating system
|
|
classes protected by operating system
|
|
controlling access with Identifier ACEs #1
|
|
controlling access with Identifier ACEs #2
|
|
displaying default protection and ownership
|
|
displaying security profiles
|
|
global sections
|
|
granting access through protection codes
|
|
in security models
|
|
kinds of events audited
|
|
logical name tables
|
|
managing default protection and ownership
|
|
modifying class templates
|
|
protection codes #1
|
|
protection codes #2
|
|
queues
|
|
reassigning ownership
|
|
resource domains
|
|
role in security models
|
|
rules for determining access
|
|
security class
|
|
security elements source
|
|
security management overview
|
|
security profiles #1
|
|
security profiles #2
|
|
volumes
|
|
OPCOM (operator communication manager), security auditing and
|
|
Open accounts
|
|
C2 systems and
|
|
captive accounts and
|
|
captive recommendation
|
|
Open files and ACL consumption of memory
|
|
OpenVMS Management Station, not in C2 evaluation
|
|
OPER privilege
|
|
overriding access controls
|
|
queue access
|
|
queue management
|
|
Owner
|
|
category of user access
|