HP SENTRY Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software HP SENTRY herunter. HP Sentry User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - Fitzgerald & Long

SENTRY The Integrated Security System Release 4 User Guide Fitzgerald & Long 12341 E. Cornell Avenue, #18 Aurora, Colorado 800

Seite 2

Introduction - 6 SENTRY User’s Guide Fitzgerald & Long 6. Notice a file named "install". This is a script which will perform the

Seite 3 - Table Of Contents

Section 4 - 10 SENTRY User’s Guide Fitzgerald & Long 4.4 REBUILD CROSS REFERENCE FILES SENTRY maintains a number of traditional inverted li

Seite 4

SENTRY User’s Guide Section 4 - 11 Fitzgerald & Long 4.5 UPDATE PROTECTED COMMANDS UPDATE.VOC Command Update

Seite 6

SENTRY User’s Guide Appendix 1 - 1 Fitzgerald & Long APPENDIX 1 SENTRY INTERNAL SUBROUTINES NOTICE The subroutines documented in this appe

Seite 7 - USING THE SCREENS

Appendix 1 - 2 SENTRY User’s Guide Fitzgerald & Long This is the result of the encryption. If the data string is already encrypted and the e

Seite 8 - Data Entry Conventions

SENTRY User’s Guide Appendix 1 - 3 Fitzgerald & Long WRITE CRYPT.DATA ON FILE.VAR, REC.KEY DISPLAY.DECRYPTED SENTRY.ENCRYPT

Seite 9 - INSTALLING SENTRY

Appendix 1 - 4 SENTRY User’s Guide Fitzgerald & Long ERROR.TEXT = “””” CALL @SENTRY.USER.ITEM.CONTROL(USER.ITEM, ITEM. FOUND, ACCESS.RI

Seite 10

SENTRY User’s Guide Appendix 1 - 5 Fitzgerald & Long If an error was encountered by the subroutine, an error message will be returned. If no

Seite 11

Appendix 1 - 6 SENTRY User’s Guide Fitzgerald & Long Subroutine: SENTRY.VIOLATION.STAMP SENTRY.VIOLATION.STAMP is used to log access violat

Seite 12 - GETTING STARTED

SENTRY User’s Guide Appendix 1 - 7 Fitzgerald & Long

Seite 13

SENTRY User’s Guide Introduction - 7 Fitzgerald & Long SENTRY Main Menu 07 AUG 2000 1

Seite 15

SENTRY User’s Guide Appendix 2 - 1 Fitzgerald & Long APPENDIX 2 SENTRY KEY BINDINGS A record called "KEY.BINDINGS" in the SENTRY

Seite 16 - INTRODUCING THE MAIN MENU

Appendix 2 - 2 SENTRY User’s Guide Fitzgerald & Long environment and reenter SENTRY in order for the changes to take effect because these var

Seite 17

SENTRY User’s Guide Appendix 2 - 3 Fitzgerald & Long

Seite 18

Introduction - 8 SENTRY User’s Guide Fitzgerald & Long GETTING STARTED This section describes how to invoke the SENTRY Main Menu. It also d

Seite 19 - AND VALIDATION MENU

SENTRY User’s Guide Introduction - 9 Fitzgerald & Long Our recommendation is that you create a userid called sentry with the UID of 0 (zero).

Seite 20

Introduction - 10 SENTRY User’s Guide Fitzgerald & Long This is a safety precaution. SENTRY is a very powerful tool and should only be used

Seite 21

SENTRY User’s Guide Introduction - 11 Fitzgerald & Long wish to send the report to a specific printer, form or destination use the SETPTR com

Seite 22

Introduction - 12 SENTRY User’s Guide Fitzgerald & Long INTRODUCING THE MAIN MENU SENTRY'S Main Menu follows the copyright screen and t

Seite 23

SENTRY User’s Guide Introduction - 13 Fitzgerald & Long The first selection, Database Creation and Validation Menu offers access to programs

Seite 25

SENTRY User’s Guide Section 1 - 1 Fitzgerald & Long 1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU The first selection of SE

Seite 26

NOTICE The information contained in this guide is subject to change without notice. Fitzgerald & Long, Inc. shall not be liable for technical o

Seite 27

Section 1 - 2 SENTRY User’s Guide Fitzgerald & Long 1.0 DATABASE CREATION AND VALUDATION MENU This is the first submenu accessible from SEN

Seite 28

SENTRY User’s Guide Section 1 - 3 Fitzgerald & Long

Seite 29

Section 1 - 4 SENTRY User’s Guide Fitzgerald & Long 1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX This program loads the data from the UNIX

Seite 30

SENTRY User’s Guide Section 1 - 5 Fitzgerald & Long We recommend: Upload the passwd and group files into the SENTRY databases on a regular b

Seite 31 - MAINTENANCE MENU

Section 1 - 6 SENTRY User’s Guide Fitzgerald & Long 1.2 CREATE DATABASE FROM FILE SYSTEM This section describes the program which create th

Seite 32 - 2.0 DATABASE MAINTENANCE

SENTRY User’s Guide Section 1 - 7 Fitzgerald & Long 1.3 VALIDATE THE USER PROFILE DATABASE This program is used to check the consistency of

Seite 33

Section 1 - 8 SENTRY User’s Guide Fitzgerald & Long This program will generate a printed report, using whatever printer setup is in effect at

Seite 34

SENTRY User’s Guide Section 1 - 9 Fitzgerald & Long 3. “Password for User XXXXX is less than N characters.” - The user “XXXXX” has a pas

Seite 35

Section 1 - 10 SENTRY User’s Guide Fitzgerald & Long 5. “Group (GID) XXXXX on /ZZZZZ does not exist.” - The group number “XXXXX” is the reg

Seite 36

SENTRY User’s Guide Section 1 - 11 Fitzgerald & Long

Seite 37

Table Of Contents USING THIS GUIDE---------------------------------------------------------------------------------------- Intro - 1 USING THE SCREENS

Seite 39

SENTRY User’s Guide Section 2 - 1 Fitzgerald & Long 2. INTRODUCING THE DATABASE MAINTENANCE MENU The second selection on SENTRY's

Seite 40 - 2.2 USER MAINTENANCE

Section 2 - 2 SENTRY User’s Guide Fitzgerald & Long 2.0 DATABASE MAINTENANCE This is the second sub-menu accessible from SENTRY’s Main Menu

Seite 41

SENTRY User’s Guide Section 2 - 3 Fitzgerald & Long 4. File System. This entry allows you to scroll through your UNIX tree structure much

Seite 42

Section 2 - 4 SENTRY User’s Guide Fitzgerald & Long 2.1 SYSTEM PROFILE MAINTENANCE This data entry program is used to display and change th

Seite 43

SENTRY User’s Guide Section 2 - 5 Fitzgerald & Long 1. Null Passwords Allowed - The default of this field is “N”. When set to “N”o, each

Seite 44

Section 2 - 6 SENTRY User’s Guide Fitzgerald & Long • Each password must contain at least two alphabetic characters and at least one numeric

Seite 45

SENTRY User’s Guide Section 2 - 7 Fitzgerald & Long However, we recommend using UIDs smaller than 5 digits simply to make them easier to read

Seite 46

Section 2 - 8 SENTRY User’s Guide Fitzgerald & Long Note that the indexing occurs at the time that the “Create Database from File System” pro

Seite 47

SENTRY User’s Guide Section 2 - 9 Fitzgerald & Long 1. Minimum password change (days): Enter the number of days before a user is allowed to

Seite 49

Section 2 - 10 SENTRY User’s Guide Fitzgerald & Long 2.2 USER MAINTENANCE This data entry program is used to display, change, and delete us

Seite 50

SENTRY User’s Guide Section 2 - 11 Fitzgerald & Long SENTRY database using the user’s name, enter “@” followed by the first or last name of t

Seite 51

Section 2 - 12 SENTRY User’s Guide Fitzgerald & Long configured (through the System Profile screen) to generate alphanumeric passwords, which

Seite 52

SENTRY User’s Guide Section 2 - 13 Fitzgerald & Long 8. Command - This field normally defines the startup UNIX shell the user invokes. The

Seite 53 - 2.4 FILE SYSTEM

Section 2 - 14 SENTRY User’s Guide Fitzgerald & Long new password for 90 days before he was forced by UNIX to enter a new password. This is

Seite 54

SENTRY User’s Guide Section 2 - 15 Fitzgerald & Long To exit you must save your changes by entering “F”. If you make no changes or wish to ca

Seite 55

Section 2 - 16 SENTRY User’s Guide Fitzgerald & Long /jaf Enter "<ESC>" to quit : Figure 17 - This is an example of

Seite 56

SENTRY User’s Guide Section 2 - 17 Fitzgerald & Long D) Do not delete this user. This option allows the user to return to the main User M

Seite 57

Section 2 - 18 SENTRY User’s Guide Fitzgerald & Long 2.3 GROUP MAINTENANCE Through this data entry program you may add and delete groups fr

Seite 58 - ACLs Maintenance

SENTRY User’s Guide Section 2 - 19 Fitzgerald & Long 2. GID - This is the number assigned to this group name. You may use “@” for a list of

Seite 59

SENTRY User’s Guide Introduction - 1 Fitzgerald & Long USING THIS GUIDE The SENTRY User's Guide is comprehensive in its descriptions of

Seite 60

Section 2 - 20 SENTRY User’s Guide Fitzgerald & Long In UNIX every file has an owner and a group. The references to owners and groups are th

Seite 61 - More File Manager Views

SENTRY User’s Guide Section 2 - 21 Fitzgerald & Long GROUP.MAINT Group Maintenance 08/14/00 Files o

Seite 62

Section 2 - 22 SENTRY User’s Guide Fitzgerald & Long D) Do not delete this group. This option allows the user to return to the main Group M

Seite 63

SENTRY User’s Guide Section 2 - 23 Fitzgerald & Long 2.4 FILE SYSTEM With this program you may change owners, groups and the permissions fo

Seite 64 - 2.5 COMMAND MAINTENANCE

Section 2 - 24 SENTRY User’s Guide Fitzgerald & Long FILE.MANAGER General File Utility 16:24:02 07 AUG 2000 CURSOR.

Seite 65

SENTRY User’s Guide Section 2 - 25 Fitzgerald & Long One of the most valuable functions of this program is the ability to find files and dire

Seite 66

Section 2 - 26 SENTRY User’s Guide Fitzgerald & Long FILE.MAINT Detailed File View 08/08/00 File

Seite 67

SENTRY User’s Guide Section 2 - 27 Fitzgerald & Long In the lower half of the screen the file owner, group and permissions are displayed. Yo

Seite 68

Section 2 - 28 SENTRY User’s Guide Fitzgerald & Long ACLs Maintenance Access Control Lists (ACLs) are an extension the standard UNIX file pe

Seite 69

SENTRY User’s Guide Section 2 - 29 Fitzgerald & Long This is an example of the “ACL Maintenance Screen”. Not all UNIX systems support ACLs.

Seite 70

Introduction - 2 SENTRY User’s Guide Fitzgerald & Long PI/open the command prompt is indicated by a colon “:” while for uniVerse the prompt i

Seite 71

Section 2 - 30 SENTRY User’s Guide Fitzgerald & Long

Seite 72

SENTRY User’s Guide Section 2 - 31 Fitzgerald & Long The next field “3. Permissions” consists of three sets of three permissions. In our ex

Seite 73 - 3. Reports Menu

Section 2 - 32 SENTRY User’s Guide Fitzgerald & Long the user is not the owner and not a member of the group associated with a file, the perm

Seite 74 - 3.0 REPORTS MENU

SENTRY User’s Guide Section 2 - 33 Fitzgerald & Long FILE.MANAGER General File Utility 14:39:56 18 AUG 2000

Seite 75

Section 2 - 34 SENTRY User’s Guide Fitzgerald & Long 2.5 COMMAND MAINTENANCE This program is used to update protection of VOC items in uniV

Seite 76 - 3.1 SYSTEM PROFILE REPORT

SENTRY User’s Guide Section 2 - 35 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Me

Seite 77

Section 2 - 36 SENTRY User’s Guide Fitzgerald & Long X - Execute from inside a program only UX - Both use at database prompt and from

Seite 78

SENTRY User’s Guide Section 2 - 37 Fitzgerald & Long Enter Field Number, "F"ile, "DEL"ete or <ESC> to Exit: - This

Seite 79

Section 2 - 38 SENTRY User’s Guide Fitzgerald & Long 2.6 USER ITEM PROTECTION MAINTENANCE This is a special SENTRY feature which allows you

Seite 80

SENTRY User’s Guide Section 2 - 39 Fitzgerald & Long To execute this program, select 2. Database Maintenance Menu from SENTRY's Main Me

Seite 81 - 3.2 USER PROFILES

SENTRY User’s Guide Introduction - 3 Fitzgerald & Long USING THE SCREENS SENTRY data entry screens feature some very helpful functions. The

Seite 82

Section 2 - 40 SENTRY User’s Guide Fitzgerald & Long 5. Groups - This is a input window used to enter the groups associated with this User

Seite 83 - 3.3 GROUPS REPORT

SENTRY User’s Guide Section 2 - 41 Fitzgerald & Long To save changes you have made to the User Items, enter "F" to file. After fil

Seite 84

Section 2 - 42 SENTRY User’s Guide Fitzgerald & Long Enter Line # of Groups (or Users) (1-N), "A"dd, "F"orward or "B

Seite 85

SENTRY User’s Guide Section 3 - 1 Fitzgerald & Long 3. INTRODUCING THE REPORTS MENU The third selection on SENTRY's Main Menu is 3. Re

Seite 86

Section 3 - 2 SENTRY User’s Guide Fitzgerald & Long 3.0 REPORTS MENU This is the third submenu accessible from SENTRY's Main Menu. A

Seite 87

SENTRY User’s Guide Section 3 - 3 Fitzgerald & Long Selection five Command Protection, is the same information as selection four except the

Seite 88

Section 3 - 4 SENTRY User’s Guide Fitzgerald & Long 3.1 SYSTEM PROFILE REPORT Selection one, System Profile, generates a report detailing

Seite 89

SENTRY User’s Guide Section 3 - 5 Fitzgerald & Long Minimum Password Length - This is a UNIX defined parameter as well as one used by SENTRY

Seite 90

Section 3 - 6 SENTRY User’s Guide Fitzgerald & Long embedded numeric. The default and recommended value is ALPHA which will generate a strin

Seite 91 - 4. Utilities Menu

SENTRY User’s Guide Section 3 - 7 Fitzgerald & Long Maximum user ID Length - This field contains a number defining the maximum number of ch

Seite 92 - 4.0 UTILITIES MENU

Introduction - 4 SENTRY User’s Guide Fitzgerald & Long Data Entry Conventions Underscore/underline When awaiting data, the cursor is posit

Seite 93

Section 3 - 8 SENTRY User’s Guide Fitzgerald & Long Punct for File Indexing - SENTRY builds B-trees to provide rapid cross referencing into

Seite 94 - 4.1 VOC PROTECTION SETUP

SENTRY User’s Guide Section 3 - 9 Fitzgerald & Long 3.2 USER PROFILES The SENTRY User Profile Report displays all parameters in effect for

Seite 95

Section 3 - 10 SENTRY User’s Guide Fitzgerald & Long UID - UNIX maintains a relationship between users and files by assigning ownership via

Seite 96

SENTRY User’s Guide Section 3 - 11 Fitzgerald & Long 3.3 GROUPS REPORT The SENTRY Groups Report displays, in a very concise format, all dat

Seite 97 - 4.3 PASSWORD CREATION

Section 3 - 12 SENTRY User’s Guide Fitzgerald & Long GID for Users - The users listed in this field are assigned this group in the passwd fi

Seite 98

SENTRY User’s Guide Section 3 - 13 Fitzgerald & Long 3.4 ACCOUNT PROTECTION REPORT This is a report of all protected commands on your syste

Seite 99

Section 3 - 14 SENTRY User’s Guide Fitzgerald & Long Description - The description field is used for documentation and may be entered throug

Seite 100

SENTRY User’s Guide Section 3 - 15 Fitzgerald & Long 3.5 COMMAND PROTECTION REPORT The SENTRY Command Protection Report presents an alphabe

Seite 101

Section 3 - 16 SENTRY User’s Guide Fitzgerald & Long Group Name & Rights - This field displays the names of groups (if any) used to defi

Seite 102

SENTRY User’s Guide Section 3 - 17 Fitzgerald & Long 3.6 ACCESS VIOLATIONS REPORT The SENTRY Access Violations Report is an audit report of

Seite 103 - APPENDIX 1

SENTRY User’s Guide Introduction - 5 Fitzgerald & Long INSTALLING SENTRY Installing the SENTRY software is very simple! Just follow these ea

Seite 104 - DATA ENCRYPTION

Section 3 - 18 SENTRY User’s Guide Fitzgerald & Long Pathname - This is the pathname to the account containing the protected VOC item which w

Seite 105

SENTRY User’s Guide Section 4 - 1 Fitzgerald & Long 4. INTRODUCING THE UTILITIES MENU The Utilities Menu is executed through selection four

Seite 106

Section 4 - 2 SENTRY User’s Guide Fitzgerald & Long 4.0 UTILITIES MENU This menu provides access to five utility programs designed to save

Seite 107 - ERROR.TEXT will be null

SENTRY User’s Guide Section 4 - 3 Fitzgerald & Long Selection four, Rebuild SENTRY Cross Reference Files. Sentry maintains a number of trad

Seite 108

Section 4 - 4 SENTRY User’s Guide Fitzgerald & Long 4.1 VOC PROTECTION SETUP This program provides the convenience of being able to copy th

Seite 109

SENTRY User’s Guide Section 4 - 5 Fitzgerald & Long 4.2 PUGING THE VIOLATIONS LOG This program provides a convenient method of selectively

Seite 110

Section 4 - 6 SENTRY User’s Guide Fitzgerald & Long This program is constructing a query sentence to SELECT the items to be purged. When ent

Seite 111 - APPENDIX 2

SENTRY User’s Guide Section 4 - 7 Fitzgerald & Long 4.3 PASSWORD CREATION This program provides a convenient utility to assist you in creat

Seite 112

Section 4 - 8 SENTRY User’s Guide Fitzgerald & Long MM/DD/YY. Sentry will select all users whose password update date is earlier than this d

Seite 113

SENTRY User’s Guide Section 4 - 9 Fitzgerald & Long 4. Department - If you have entered data into the “department” field of the SENTRY.USERS

Kommentare zu diesen Handbüchern

Keine Kommentare