| P | 
  
  
    | 
Paper shredders
     | 
  
  
    | 
Password generators
     | 
  
  
    | 
    obtaining initial password
     | 
  
  
    | 
    when to require
     | 
  
  
    | 
Password grabber programs #1
     | 
  
  
    | 
Password grabber programs #2
     | 
  
  
    | 
Password grabber programs #3
     | 
  
  
    | 
    catching with auditing ACEs
     | 
  
  
    | 
Password history
     | 
  
  
    | 
Password protection #1
     | 
  
  
    | 
Password protection #2
     | 
  
  
    | 
Password synchronization
     | 
  
  
    | 
Passwords
     | 
  
  
    | 
    acceptable
     | 
  
  
    | 
    automatically generated #1
     | 
  
  
    | 
    automatically generated #2
     | 
  
  
    | 
    avoiding detection #1
     | 
  
  
    | 
    avoiding detection #2
     | 
  
  
    | 
    avoiding detection #3
     | 
  
  
    | 
    chances to supply during dialups
     | 
  
  
    | 
    changing #1
     | 
  
  
    | 
    changing #2
     | 
  
  
    | 
        at login
     | 
  
  
    | 
        expired
     | 
  
  
    | 
        frequency guidelines
     | 
  
  
    | 
        secondary
     | 
  
  
    | 
        using /NEW_PASSWORD qualifier
     | 
  
  
    | 
    cluster membership management
     | 
  
  
    | 
    console
     | 
  
  
    | 
        C2 system requirements
     | 
  
  
    | 
    console passwords
     | 
  
  
    | 
    dialup retries #1
     | 
  
  
    | 
    dialup retries #2
     | 
  
  
    | 
    dual #1
     | 
  
  
    | 
    dual #2
     | 
  
  
    | 
    eliminating for networks
     | 
  
  
    | 
    encoding
     | 
  
  
    | 
    encryption algorithms
     | 
  
  
    | 
    expiration #1
     | 
  
  
    | 
    expiration #2
     | 
  
  
    | 
    expiration #3
     | 
  
  
    | 
    expiration time
     | 
  
  
    | 
    failure to change
     | 
  
  
    | 
    first
     | 
  
  
    | 
    forced change #1
     | 
  
  
    | 
    forced change #2
     | 
  
  
    | 
    format
     | 
  
  
    | 
    generated #1
     | 
  
  
    | 
    generated #2
     | 
  
  
    | 
    generated #3
     | 
  
  
    | 
    guessing
     | 
  
  
    | 
    history list
     | 
  
  
    | 
    how to preexpire
     | 
  
  
    | 
    incorrect
     | 
  
  
    | 
    initial #1
     | 
  
  
    | 
    initial #2
     | 
  
  
    | 
    length #1
     | 
  
  
    | 
    length #2
     | 
  
  
    | 
    length #3
     | 
  
  
    | 
    lifetime of #1
     | 
  
  
    | 
    lifetime of #2
     | 
  
  
    | 
    locked #1
     | 
  
  
    | 
    locked #2
     | 
  
  
    | 
    locked #3
     | 
  
  
    | 
    minimum length #1
     | 
  
  
    | 
    minimum length #2
     | 
  
  
    | 
    minimum length #3
     | 
  
  
    | 
    multiple systems and
     | 
  
  
    | 
    new
     | 
  
  
    | 
    null as choice for captive account
     | 
  
  
    | 
    open accounts and
     | 
  
  
    | 
    password grabber programs
     | 
  
  
    | 
    primary #1
     | 
  
  
    | 
    primary #2
     | 
  
  
    | 
    primary #3
     | 
  
  
    | 
    proxy logins
     | 
  
  
    | 
    reason for changing #1
     | 
  
  
    | 
    reason for changing #2
     | 
  
  
    | 
    receive
     | 
  
  
    | 
    restrictions #1
     | 
  
  
    | 
    restrictions #2
     | 
  
  
    | 
    reuse
     | 
  
  
    | 
    risky
     | 
  
  
    | 
    routing initialization
     | 
  
  
    | 
    screening
     | 
  
  
    | 
        against dictionary
     | 
  
  
    | 
        against history list
     | 
  
  
    | 
        with site-specific filter
     | 
  
  
    | 
    secondary #1
     | 
  
  
    | 
    secondary #2
     | 
  
  
    | 
        changing
     | 
  
  
    | 
        changing expired
     | 
  
  
    | 
        entering
     | 
  
  
    | 
    secure
     | 
  
  
    | 
    secure choices for
     | 
  
  
    | 
    secure terminal servers and
     | 
  
  
    | 
    sharing #1
     | 
  
  
    | 
    sharing #2
     | 
  
  
    | 
    system #1
     | 
  
  
    | 
    system #2
     | 
  
  
    | 
    system #3
     | 
  
  
    | 
        dictionary
     | 
  
  
    | 
    transmit
     | 
  
  
    | 
    types
     | 
  
  
    | 
    uniqueness for each account
     | 
  
  
    | 
    user #1
     | 
  
  
    | 
    user #2
     | 
  
  
    | 
    user guidelines
     | 
  
  
    | 
    verifying change of
     | 
  
  
    | 
    when account is created
     | 
  
  
    | 
    when to change
     | 
  
  
    | 
Performance
     | 
  
  
    | 
    ACL length and
     | 
  
  
    | 
    high-water marking and
     | 
  
  
    | 
    security-auditing impact
     | 
  
  
    | 
PFMGBL privilege
     | 
  
  
    | 
PFNMAP privilege #1
     | 
  
  
    | 
PFNMAP privilege #2
     | 
  
  
    | 
PHONE objects
     | 
  
  
    | 
Physical I/O access
     | 
  
  
    | 
Physical security
     | 
  
  
    | 
    C2 systems and
     | 
  
  
    | 
    encrypting files
     | 
  
  
    | 
    restricting system access
     | 
  
  
    | 
    violation indicators
     | 
  
  
    | 
    when logging out #1
     | 
  
  
    | 
    when logging out #2
     | 
  
  
    | 
PHY_IO privilege #1
     | 
  
  
    | 
PHY_IO privilege #2
     | 
  
  
    | 
PIPE command, impact on subprocess auditing events
     | 
  
  
    | 
PIPE subprocess, analyzing audit messages
     | 
  
  
    | 
Port, terminal
     | 
  
  
    | 
/PRCLM qualifier in AUTHORIZE
     | 
  
  
    | 
Primary passwords
     | 
  
  
    | 
/PRIMEDAYS qualifier, example
     | 
  
  
    | 
Printers
     | 
  
  
    | 
    C2 systems and
     | 
  
  
    | 
    default security elements
     | 
  
  
    | 
Privilege requirements
     | 
  
  
    | 
    common event flag clusters
     | 
  
  
    | 
    devices
     | 
  
  
    | 
    global sections
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    queues
     | 
  
  
    | 
    resource domains
     | 
  
  
    | 
    volumes
     | 
  
  
    | 
Privileged accounts #1
     | 
  
  
    | 
Privileged accounts #2
     | 
  
  
    | 
Privileges
     | 
  
  
    | 
    ACNT
     | 
  
  
    | 
    affecting object access
     | 
  
  
    | 
    All category #1
     | 
  
  
    | 
    All category #2
     | 
  
  
    | 
    ALLSPOOL
     | 
  
  
    | 
    ALTPRI
     | 
  
  
    | 
    AUDIT
     | 
  
  
    | 
    auditing use of #1
     | 
  
  
    | 
    auditing use of #2
     | 
  
  
    | 
    authorized process #1
     | 
  
  
    | 
    authorized process #2
     | 
  
  
    | 
    BUGCHK
     | 
  
  
    | 
    BYPASS #1
     | 
  
  
    | 
    BYPASS #2
     | 
  
  
    | 
    BYPASS #3
     | 
  
  
    | 
    BYPASS #4
     | 
  
  
    | 
    BYPASS #5
     | 
  
  
    | 
    bypassing ACLs
     | 
  
  
    | 
    bypassing protection codes
     | 
  
  
    | 
    captive accounts and
     | 
  
  
    | 
    categories of #1
     | 
  
  
    | 
    categories of #2
     | 
  
  
    | 
    CMEXEC
     | 
  
  
    | 
    CMKRNL
     | 
  
  
    | 
    default process #1
     | 
  
  
    | 
    default process #2
     | 
  
  
    | 
    definition
     | 
  
  
    | 
    DETACH
     | 
  
  
    | 
    Devour category #1
     | 
  
  
    | 
    Devour category #2
     | 
  
  
    | 
    DIAGNOSE
     | 
  
  
    | 
    disabling
     | 
  
  
    | 
    DOWNGRADE
     | 
  
  
    | 
    enabling through SETPRV
     | 
  
  
    | 
    EXQUOTA
     | 
  
  
    | 
    file sharing and
     | 
  
  
    | 
    GROUP #1
     | 
  
  
    | 
    GROUP #2
     | 
  
  
    | 
    Group category #1
     | 
  
  
    | 
    Group category #2
     | 
  
  
    | 
    GRPNAM #1
     | 
  
  
    | 
    GRPNAM #2
     | 
  
  
    | 
    GRPPRV #1
     | 
  
  
    | 
    GRPPRV #2
     | 
  
  
    | 
    GRPPRV #3
     | 
  
  
    | 
    GRPPRV #4
     | 
  
  
    | 
    GRPPRV #5
     | 
  
  
    | 
    GRPPRV #6
     | 
  
  
    | 
    GRPPRV #7
     | 
  
  
    | 
    IMPERSONATE
     | 
  
  
    | 
    IMPORT
     | 
  
  
    | 
    influence on object access
     | 
  
  
    | 
    LOG_IO
     | 
  
  
    | 
    MOUNT
     | 
  
  
    | 
    NETMBX
     | 
  
  
    | 
    network requirements
     | 
  
  
    | 
    Normal category #1
     | 
  
  
    | 
    Normal category #2
     | 
  
  
    | 
    Objects category #1
     | 
  
  
    | 
    Objects category #2
     | 
  
  
    | 
    OPER #1
     | 
  
  
    | 
    OPER #2
     | 
  
  
    | 
    PFNMAP
     | 
  
  
    | 
    PHY_IO
     | 
  
  
    | 
    PRMCEB
     | 
  
  
    | 
    PRMGBL
     | 
  
  
    | 
    PRMMBX
     | 
  
  
    | 
    process
     | 
  
  
    | 
    PSWAPM
     | 
  
  
    | 
    READALL #1
     | 
  
  
    | 
    READALL #2
     | 
  
  
    | 
    READALL #3
     | 
  
  
    | 
    recommendations for different users
     | 
  
  
    | 
    related to group UIC
     | 
  
  
    | 
    reporting use with $CHECK_PRIVILEGE
     | 
  
  
    | 
    SECURITY
     | 
  
  
    | 
    security administrator requirements
     | 
  
  
    | 
    SET PROCESS/PRIVILEGES
     | 
  
  
    | 
    SETPRV
     | 
  
  
    | 
    SHARE
     | 
  
  
    | 
    SHMEM
     | 
  
  
    | 
    storage in UAF record
     | 
  
  
    | 
    summary of #1
     | 
  
  
    | 
    summary of #2
     | 
  
  
    | 
    SYSGBL
     | 
  
  
    | 
    SYSLCK
     | 
  
  
    | 
    SYSNAM
     | 
  
  
    | 
    SYSPRV #1
     | 
  
  
    | 
    SYSPRV #2
     | 
  
  
    | 
        controlling access through
     | 
  
  
    | 
        effect on protection mechanisms
     | 
  
  
    | 
        giving rights of system user
     | 
  
  
    | 
        tasks requiring
     | 
  
  
    | 
    System category
     | 
  
  
    | 
    TMPMBX
     | 
  
  
    | 
    trusted users and
     | 
  
  
    | 
    UAF records and
     | 
  
  
    | 
    untrusted users and
     | 
  
  
    | 
    UPGRADE
     | 
  
  
    | 
    VOLPRO
     | 
  
  
    | 
    WORLD
     | 
  
  
    | 
PRMCEB privilege #1
     | 
  
  
    | 
PRMCEB privilege #2
     | 
  
  
    | 
PRMGBL privilege
     | 
  
  
    | 
PRMMBX privilege #1
     | 
  
  
    | 
PRMMBX privilege #2
     | 
  
  
    | 
Probers, catching #1
     | 
  
  
    | 
Probers, catching #2
     | 
  
  
    | 
Probing, as security problem
     | 
  
  
    | 
Process exclusion list
     | 
  
  
    | 
Processes
     | 
  
  
    | 
    access rights of
     | 
  
  
    | 
    activities permitted by privileges
     | 
  
  
    | 
    adding to exclusion list
     | 
  
  
    | 
    audit server
     | 
  
  
    | 
    auditing of #1
     | 
  
  
    | 
    auditing of #2
     | 
  
  
    | 
    auditing system services controlling
     | 
  
  
    | 
    connecting restrictions
     | 
  
  
    | 
    creating with different UICs
     | 
  
  
    | 
    default protection for
     | 
  
  
    | 
    disconnected #1
     | 
  
  
    | 
    disconnected #2
     | 
  
  
    | 
    displaying default protection
     | 
  
  
    | 
    displaying process rights identifiers
     | 
  
  
    | 
    enabling privileges
     | 
  
  
    | 
    interactive mode
     | 
  
  
    | 
    logging out of current
     | 
  
  
    | 
    modifying the rights list
     | 
  
  
    | 
    reconnecting
     | 
  
  
    | 
    security profiles of
     | 
  
  
    | 
    suspending
     | 
  
  
    | 
    UIC identifiers
     | 
  
  
    | 
Project accounts
     | 
  
  
    | 
    as protected subsystems
     | 
  
  
    | 
    setting up
     | 
  
  
    | 
Prompts, passwords and
     | 
  
  
    | 
Propagating protection, example
     | 
  
  
    | 
Protected attribute #1
     | 
  
  
    | 
Protected attribute #2
     | 
  
  
    | 
    deleting ACEs with
     | 
  
  
    | 
Protected object databases
     | 
  
  
    | 
Protected subsystems
     | 
  
  
    | 
    advantages of #1
     | 
  
  
    | 
    advantages of #2
     | 
  
  
    | 
    applications for
     | 
  
  
    | 
    constructing
     | 
  
  
    | 
    description of #1
     | 
  
  
    | 
    description of #2
     | 
  
  
    | 
    design requirements
     | 
  
  
    | 
    enabling
     | 
  
  
    | 
    example
     | 
  
  
    | 
    file protection #1
     | 
  
  
    | 
    file protection #2
     | 
  
  
    | 
    mounting volumes with
     | 
  
  
    | 
    printer protection
     | 
  
  
    | 
    subsystem ACEs
     | 
  
  
    | 
    system management requirements
     | 
  
  
    | 
    user access
     | 
  
  
    | 
Protection
     | 
  
  
    | 
    ACL-based
     | 
  
  
    | 
    capability
     | 
  
  
    | 
    command procedures and
     | 
  
  
    | 
    common event flag clusters
     | 
  
  
    | 
    deleted data #1
     | 
  
  
    | 
    deleted data #2
     | 
  
  
    | 
    deleted data #3
     | 
  
  
    | 
    deleted data #4
     | 
  
  
    | 
    devices
     | 
  
  
    | 
    global sections
     | 
  
  
    | 
    logical name tables
     | 
  
  
    | 
    managing defaults #1
     | 
  
  
    | 
    managing defaults #2
     | 
  
  
    | 
    objects
     | 
  
  
    | 
    queues
     | 
  
  
    | 
    resource domains
     | 
  
  
    | 
    security class
     | 
  
  
    | 
    through protected subsystems
     | 
  
  
    | 
    UIC-based codes
     | 
  
  
    | 
    volumes
     | 
  
  
    | 
Protection checking
     | 
  
  
    | 
    evaluating an object access request
     | 
  
  
    | 
    exception with zero UICs
     | 
  
  
    | 
    influenced by ownership
     | 
  
  
    | 
Protection codes
     | 
  
  
    | 
    access specification
     | 
  
  
    | 
    access types
     | 
  
  
    | 
    assigning during file creation
     | 
  
  
    | 
    bypassing with special rights
     | 
  
  
    | 
    changing
     | 
  
  
    | 
    default file protection #1
     | 
  
  
    | 
    default file protection #2
     | 
  
  
    | 
    definition #1
     | 
  
  
    | 
    definition #2
     | 
  
  
    | 
    denying all access
     | 
  
  
    | 
    effect of privileges
     | 
  
  
    | 
    evaluation sequence
     | 
  
  
    | 
    format
     | 
  
  
    | 
    granting control access
     | 
  
  
    | 
    Identifier ACEs and
     | 
  
  
    | 
    interaction with ACLs
     | 
  
  
    | 
    interpreting
     | 
  
  
    | 
    multiple user categories and
     | 
  
  
    | 
    null access specification #1
     | 
  
  
    | 
    null access specification #2
     | 
  
  
    | 
    priority in access evaluation
     | 
  
  
    | 
    processing
     | 
  
  
    | 
    queue access rights
     | 
  
  
    | 
    reading
     | 
  
  
    | 
    restoring file default
     | 
  
  
    | 
    security element of an object
     | 
  
  
    | 
    sequence of checking categories
     | 
  
  
    | 
    user categories
     | 
  
  
    | 
Protocols
     | 
  
  
    | 
    autodial/master
     | 
  
  
    | 
Protocols, autodial/nomaster
     | 
  
  
    | 
Proxy access
     | 
  
  
    | 
    access control
     | 
  
  
    | 
    removing
     | 
  
  
    | 
    setting up a proxy database for
     | 
  
  
    | 
    to applications
     | 
  
  
    | 
    to nodes
     | 
  
  
    | 
Proxy accounts #1
     | 
  
  
    | 
Proxy accounts #2
     | 
  
  
    | 
    as captive accounts
     | 
  
  
    | 
    as restricted accounts
     | 
  
  
    | 
    C2 systems and
     | 
  
  
    | 
    default
     | 
  
  
    | 
    example #1
     | 
  
  
    | 
    example #2
     | 
  
  
    | 
    general-access
     | 
  
  
    | 
    maximum number allowed
     | 
  
  
    | 
    multiple-user
     | 
  
  
    | 
    naming
     | 
  
  
    | 
    recommended restrictions
     | 
  
  
    | 
    selecting from multiple
     | 
  
  
    | 
    single-user
     | 
  
  
    | 
Proxy database
     | 
  
  
    | 
    setting up
     | 
  
  
    | 
Proxy logins
     | 
  
  
    | 
    access control
     | 
  
  
    | 
    account
     | 
  
  
    | 
    establishing and managing #1
     | 
  
  
    | 
    establishing and managing #2
     | 
  
  
    | 
    NET$PROXY.DAT
     | 
  
  
    | 
    NETPROXY.DAT
     | 
  
  
    | 
    network applications
     | 
  
  
    | 
    security benefits
     | 
  
  
    | 
PSWAPM privilege
     | 
  
  
    | 
PURGE command, /ERASE qualifier
     | 
  
  
    | 
/PWDLIFETIME qualifier
     | 
  
  
    | 
/PWDMINIMUM qualifier
     |