HP Sentry User Manual

Page 75

Advertising
background image

SENTRY User’s Guide

Section 3 - 3



Fitzgerald & Long

Selection five Command Protection, is the same information as selection four except the report is
sorted by the name of the command which is protected. A list of accounts where that command is protected
is displayed.

Choosing selection six, Access Violations, prints the SENTRY Violations Log. Entries are printed in
chronological order. Each record includes date, time, port number, USER ID, pathname and the protected
command which was executed creating the violation.

In the following sections, each report is described and an example is provided.

Advertising