P |
Paper shredders
|
Password generators
|
obtaining initial password
|
when to require
|
Password grabber programs #1
|
Password grabber programs #2
|
Password grabber programs #3
|
catching with auditing ACEs
|
Password history
|
Password protection #1
|
Password protection #2
|
Password synchronization
|
Passwords
|
acceptable
|
automatically generated #1
|
automatically generated #2
|
avoiding detection #1
|
avoiding detection #2
|
avoiding detection #3
|
chances to supply during dialups
|
changing #1
|
changing #2
|
at login
|
expired
|
frequency guidelines
|
secondary
|
using /NEW_PASSWORD qualifier
|
cluster membership management
|
console
|
C2 system requirements
|
console passwords
|
dialup retries #1
|
dialup retries #2
|
dual #1
|
dual #2
|
eliminating for networks
|
encoding
|
encryption algorithms
|
expiration #1
|
expiration #2
|
expiration #3
|
expiration time
|
failure to change
|
first
|
forced change #1
|
forced change #2
|
format
|
generated #1
|
generated #2
|
generated #3
|
guessing
|
history list
|
how to preexpire
|
incorrect
|
initial #1
|
initial #2
|
length #1
|
length #2
|
length #3
|
lifetime of #1
|
lifetime of #2
|
locked #1
|
locked #2
|
locked #3
|
minimum length #1
|
minimum length #2
|
minimum length #3
|
multiple systems and
|
new
|
null as choice for captive account
|
open accounts and
|
password grabber programs
|
primary #1
|
primary #2
|
primary #3
|
proxy logins
|
reason for changing #1
|
reason for changing #2
|
receive
|
restrictions #1
|
restrictions #2
|
reuse
|
risky
|
routing initialization
|
screening
|
against dictionary
|
against history list
|
with site-specific filter
|
secondary #1
|
secondary #2
|
changing
|
changing expired
|
entering
|
secure
|
secure choices for
|
secure terminal servers and
|
sharing #1
|
sharing #2
|
system #1
|
system #2
|
system #3
|
dictionary
|
transmit
|
types
|
uniqueness for each account
|
user #1
|
user #2
|
user guidelines
|
verifying change of
|
when account is created
|
when to change
|
Performance
|
ACL length and
|
high-water marking and
|
security-auditing impact
|
PFMGBL privilege
|
PFNMAP privilege #1
|
PFNMAP privilege #2
|
PHONE objects
|
Physical I/O access
|
Physical security
|
C2 systems and
|
encrypting files
|
restricting system access
|
violation indicators
|
when logging out #1
|
when logging out #2
|
PHY_IO privilege #1
|
PHY_IO privilege #2
|
PIPE command, impact on subprocess auditing events
|
PIPE subprocess, analyzing audit messages
|
Port, terminal
|
/PRCLM qualifier in AUTHORIZE
|
Primary passwords
|
/PRIMEDAYS qualifier, example
|
Printers
|
C2 systems and
|
default security elements
|
Privilege requirements
|
common event flag clusters
|
devices
|
global sections
|
logical name tables
|
queues
|
resource domains
|
volumes
|
Privileged accounts #1
|
Privileged accounts #2
|
Privileges
|
ACNT
|
affecting object access
|
All category #1
|
All category #2
|
ALLSPOOL
|
ALTPRI
|
AUDIT
|
auditing use of #1
|
auditing use of #2
|
authorized process #1
|
authorized process #2
|
BUGCHK
|
BYPASS #1
|
BYPASS #2
|
BYPASS #3
|
BYPASS #4
|
BYPASS #5
|
bypassing ACLs
|
bypassing protection codes
|
captive accounts and
|
categories of #1
|
categories of #2
|
CMEXEC
|
CMKRNL
|
default process #1
|
default process #2
|
definition
|
DETACH
|
Devour category #1
|
Devour category #2
|
DIAGNOSE
|
disabling
|
DOWNGRADE
|
enabling through SETPRV
|
EXQUOTA
|
file sharing and
|
GROUP #1
|
GROUP #2
|
Group category #1
|
Group category #2
|
GRPNAM #1
|
GRPNAM #2
|
GRPPRV #1
|
GRPPRV #2
|
GRPPRV #3
|
GRPPRV #4
|
GRPPRV #5
|
GRPPRV #6
|
GRPPRV #7
|
IMPERSONATE
|
IMPORT
|
influence on object access
|
LOG_IO
|
MOUNT
|
NETMBX
|
network requirements
|
Normal category #1
|
Normal category #2
|
Objects category #1
|
Objects category #2
|
OPER #1
|
OPER #2
|
PFNMAP
|
PHY_IO
|
PRMCEB
|
PRMGBL
|
PRMMBX
|
process
|
PSWAPM
|
READALL #1
|
READALL #2
|
READALL #3
|
recommendations for different users
|
related to group UIC
|
reporting use with $CHECK_PRIVILEGE
|
SECURITY
|
security administrator requirements
|
SET PROCESS/PRIVILEGES
|
SETPRV
|
SHARE
|
SHMEM
|
storage in UAF record
|
summary of #1
|
summary of #2
|
SYSGBL
|
SYSLCK
|
SYSNAM
|
SYSPRV #1
|
SYSPRV #2
|
controlling access through
|
effect on protection mechanisms
|
giving rights of system user
|
tasks requiring
|
System category
|
TMPMBX
|
trusted users and
|
UAF records and
|
untrusted users and
|
UPGRADE
|
VOLPRO
|
WORLD
|
PRMCEB privilege #1
|
PRMCEB privilege #2
|
PRMGBL privilege
|
PRMMBX privilege #1
|
PRMMBX privilege #2
|
Probers, catching #1
|
Probers, catching #2
|
Probing, as security problem
|
Process exclusion list
|
Processes
|
access rights of
|
activities permitted by privileges
|
adding to exclusion list
|
audit server
|
auditing of #1
|
auditing of #2
|
auditing system services controlling
|
connecting restrictions
|
creating with different UICs
|
default protection for
|
disconnected #1
|
disconnected #2
|
displaying default protection
|
displaying process rights identifiers
|
enabling privileges
|
interactive mode
|
logging out of current
|
modifying the rights list
|
reconnecting
|
security profiles of
|
suspending
|
UIC identifiers
|
Project accounts
|
as protected subsystems
|
setting up
|
Prompts, passwords and
|
Propagating protection, example
|
Protected attribute #1
|
Protected attribute #2
|
deleting ACEs with
|
Protected object databases
|
Protected subsystems
|
advantages of #1
|
advantages of #2
|
applications for
|
constructing
|
description of #1
|
description of #2
|
design requirements
|
enabling
|
example
|
file protection #1
|
file protection #2
|
mounting volumes with
|
printer protection
|
subsystem ACEs
|
system management requirements
|
user access
|
Protection
|
ACL-based
|
capability
|
command procedures and
|
common event flag clusters
|
deleted data #1
|
deleted data #2
|
deleted data #3
|
deleted data #4
|
devices
|
global sections
|
logical name tables
|
managing defaults #1
|
managing defaults #2
|
objects
|
queues
|
resource domains
|
security class
|
through protected subsystems
|
UIC-based codes
|
volumes
|
Protection checking
|
evaluating an object access request
|
exception with zero UICs
|
influenced by ownership
|
Protection codes
|
access specification
|
access types
|
assigning during file creation
|
bypassing with special rights
|
changing
|
default file protection #1
|
default file protection #2
|
definition #1
|
definition #2
|
denying all access
|
effect of privileges
|
evaluation sequence
|
format
|
granting control access
|
Identifier ACEs and
|
interaction with ACLs
|
interpreting
|
multiple user categories and
|
null access specification #1
|
null access specification #2
|
priority in access evaluation
|
processing
|
queue access rights
|
reading
|
restoring file default
|
security element of an object
|
sequence of checking categories
|
user categories
|
Protocols
|
autodial/master
|
Protocols, autodial/nomaster
|
Proxy access
|
access control
|
removing
|
setting up a proxy database for
|
to applications
|
to nodes
|
Proxy accounts #1
|
Proxy accounts #2
|
as captive accounts
|
as restricted accounts
|
C2 systems and
|
default
|
example #1
|
example #2
|
general-access
|
maximum number allowed
|
multiple-user
|
naming
|
recommended restrictions
|
selecting from multiple
|
single-user
|
Proxy database
|
setting up
|
Proxy logins
|
access control
|
account
|
establishing and managing #1
|
establishing and managing #2
|
NET$PROXY.DAT
|
NETPROXY.DAT
|
network applications
|
security benefits
|
PSWAPM privilege
|
PURGE command, /ERASE qualifier
|
/PWDLIFETIME qualifier
|
/PWDMINIMUM qualifier
|