93 lines
6.3 KiB
HTML
93 lines
6.3 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="concept" />
|
||
|
<meta name="DC.Title" content="Monitor authority" />
|
||
|
<meta name="abstract" content="This topic provides basic suggestions for monitoring the effectiveness of the security safeguards on your system." />
|
||
|
<meta name="description" content="This topic provides basic suggestions for monitoring the effectiveness of the security safeguards on your system." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorsec.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorauthlists.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorprivobjauth.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorpubobjauth.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitoruserenviron.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorspecauth.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonsignon.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonactivity.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="monitorauth" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>Monitor authority</title>
|
||
|
</head>
|
||
|
<body id="monitorauth"><a name="monitorauth"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">Monitor authority</h1>
|
||
|
<div><p>This topic provides basic suggestions for monitoring the effectiveness
|
||
|
of the security safeguards on your system.</p>
|
||
|
<p>A set of security reports are available to help you keep track of how the
|
||
|
authority is set up on your system. When you run these reports initially,
|
||
|
you can print everything (authority for all the files or for all the programs,
|
||
|
for example). </p>
|
||
|
<p>After you have established your base of information, you can run the changed
|
||
|
versions of reports regularly. The changed versions help you identify security-relevant
|
||
|
changes on your system that require your attention. For example, you can run
|
||
|
the report that shows the public authority for files every week. You can request
|
||
|
only the changed version of the report. It will show you both new files on
|
||
|
the system that are available to everyone and existing files whose public
|
||
|
authority has changed since the last report. </p>
|
||
|
<div class="p">Two menus are available to run security tools: <ul><li>Use the SECTOOLS menu for running programs interactively.</li>
|
||
|
<li>Use the SECBATCH menu for running programs in batch. The SECBATCH menu
|
||
|
has two parts: one for submitting jobs to the job queue immediately, and the
|
||
|
other for placing jobs on the job scheduler.</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
<div class="p">If you are using iSeries™ Navigator, follow these steps to run the
|
||
|
security tools: <ol><li>In iSeries Navigator,
|
||
|
expand your <span class="menucascade"><span class="uicontrol">Server</span> > <span class="uicontrol">Security</span></span>.</li>
|
||
|
<li>Right-click <span class="uicontrol">Policies</span> and select <span class="uicontrol">Explore</span> to
|
||
|
display a list of policies you can create and manage.</li>
|
||
|
</ol>
|
||
|
</div>
|
||
|
<p>Review your security policy statement and your security memo to users as
|
||
|
you decide which monitoring tasks you need to perform regularly. The following
|
||
|
topics discuss several items to watch for, when monitoring authority: </p>
|
||
|
</div>
|
||
|
<div>
|
||
|
<ul class="ullinks">
|
||
|
<li class="ulchildlink"><strong><a href="rzamvmonitorauthlists.htm">Monitor authorization lists</a></strong><br />
|
||
|
How to use authorization lists to organize object groups based on security requirements</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvmonitorprivobjauth.htm">Monitor private authority to objects</a></strong><br />
|
||
|
This article describes the SECBATCH menu options and security commands that you can use to monitor private authority to objects.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvmonitorpubobjauth.htm">Monitor public authority to objects</a></strong><br />
|
||
|
This article describes the SECBATCH menu options and security commands that you can use to monitor public authority to objects.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvmonitoruserenviron.htm">Monitor user environments</a></strong><br />
|
||
|
This article discusses using the SECBATCH menu and commands to monitor user environments.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvmonitorspecauth.htm">Monitor special authorities</a></strong><br />
|
||
|
This topic describes the SECBATCH menu options and commands used to monitor special authorities.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvmonsignon.htm">Monitor sign-on and password activity</a></strong><br />
|
||
|
If you are concerned about unauthorized attempts to enter your
|
||
|
system, you can use the <span class="cmdname">PRTUSRPRF</span> command to help you monitor
|
||
|
sign-on and password activity.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamvmonactivity.htm">Monitor user profile activity</a></strong><br />
|
||
|
As a security administrator, you need to control and audit changes that occur to user profiles on your system.</li>
|
||
|
</ul>
|
||
|
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvmonitorsec.htm" title="This set of topics discuss various techniques for monitoring and auditing security on your system.">Monitor security</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|