HP Sentry User Manual

Page 3

Advertising
background image

Table Of Contents

USING THIS GUIDE---------------------------------------------------------------------------------------- Intro - 1

USING THE SCREENS ------------------------------------------------------------------------------------ Intro - 3

INSTALLING SENTRY ------------------------------------------------------------------------------------ Intro - 5

GETTING STARTED--------------------------------------------------------------------------------------- Intro - 8

INTRODUCING THE MAIN MENU ------------------------------------------------------------------Intro - 12

1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU----------- 1 - 1

1.0 DATABASE CREATION AND VALUDATION MENU------------------------------------------- 1 - 2

1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX----------------------------------------- 1 - 4

1.2 CREATE DATABASE FROM FILE SYSTEM ------------------------------------------------------ 1 - 6

1.3 VALIDATE THE USER PROFILE DATABASE ---------------------------------------------------- 1 - 7

2. INTRODUCING THE DATABASE MAINTENANCE MENU -------------------------------- 2 - 1

2.0 DATABASE MAINTENANCE-------------------------------------------------------------------------- 2 - 2

2.1 SYSTEM PROFILE MAINTENANCE ---------------------------------------------------------------- 2 - 4

2.2 USER MAINTENANCE --------------------------------------------------------------------------------- 2 - 10

2.3 GROUP MAINTENANCE------------------------------------------------------------------------------- 2 - 18

2.4 FILE SYSTEM--------------------------------------------------------------------------------------------- 2 - 23

ACLs Maintenance------------------------------------------------------------------------------------------- 2 - 28

More File Manager Views ---------------------------------------------------------------------------------- 2 - 31

2.5 COMMAND MAINTENANCE------------------------------------------------------------------------- 2 - 34

2.6 USER ITEM PROTECTION MAINTENANCE----------------------------------------------------- 2 - 38

3. INTRODUCING THE REPORTS MENU -------------------------------------------------------------- 3 - 1

3.0 REPORTS MENU------------------------------------------------------------------------------------------ 3 - 2

3.1 SYSTEM PROFILE REPORT --------------------------------------------------------------------------- 3 - 4

3.2 USER PROFILES ------------------------------------------------------------------------------------------ 3 - 9

3.3 GROUPS REPORT --------------------------------------------------------------------------------------- 3 - 11

3.4 ACCOUNT PROTECTION REPORT----------------------------------------------------------------- 3 - 13

3.5 COMMAND PROTECTION REPORT --------------------------------------------------------------- 3 - 15

3.6 ACCESS VIOLATIONS REPORT--------------------------------------------------------------------- 3 - 17

4. INTRODUCING THE UTILITIES MENU ------------------------------------------------------------- 4 - 1

4.0 UTILITIES MENU ----------------------------------------------------------------------------------------- 4 - 2

4.1 VOC PROTECTION SETUP ---------------------------------------------------------------------------- 4 - 4

4.2 PUGING THE VIOLATIONS LOG -------------------------------------------------------------------- 4 - 5

4.3 PASSWORD CREATION -------------------------------------------------------------------------------- 4 - 7

4.4 REBUILD CROSS REFERENCE FILES ------------------------------------------------------------- 4 - 10

4.5 UPDATE PROTECTED COMMANDS--------------------------------------------------------------- 4 - 11

APPENDIX 1 ---------------------------------------------------------------------------------------------Appendix - 1

SENTRY INTERNAL SUBROUTINES----------------------------------------------------------- Appendix - 1

Subroutine: SENTRY.ENCRYPT------------------------------------------------------------------ Appendix - 1

DATA ENCRYPTION------------------------------------------------------------------------------- Appendix - 2

Subroutine: SENTRY.USER.ITEM.CONTROL------------------------------------------------- Appendix - 3

Subroutine: SENTRY.VIOLATION.STAMP----------------------------------------------------- Appendix - 6

APPENDIX 2 ------------------------------------------------------------------------------------------ Appendix 2 - 1

SENTRY KEY BINDINGS ------------------------------------------------------------------------ Appendix 2 - 1

Advertising