ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvmonitorauth.htm

93 lines
6.3 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Monitor authority" />
<meta name="abstract" content="This topic provides basic suggestions for monitoring the effectiveness of the security safeguards on your system." />
<meta name="description" content="This topic provides basic suggestions for monitoring the effectiveness of the security safeguards on your system." />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorsec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorauthlists.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorprivobjauth.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorpubobjauth.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitoruserenviron.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorspecauth.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonsignon.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonactivity.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="monitorauth" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Monitor authority</title>
</head>
<body id="monitorauth"><a name="monitorauth"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Monitor authority</h1>
<div><p>This topic provides basic suggestions for monitoring the effectiveness
of the security safeguards on your system.</p>
<p>A set of security reports are available to help you keep track of how the
authority is set up on your system. When you run these reports initially,
you can print everything (authority for all the files or for all the programs,
for example). </p>
<p>After you have established your base of information, you can run the changed
versions of reports regularly. The changed versions help you identify security-relevant
changes on your system that require your attention. For example, you can run
the report that shows the public authority for files every week. You can request
only the changed version of the report. It will show you both new files on
the system that are available to everyone and existing files whose public
authority has changed since the last report. </p>
<div class="p">Two menus are available to run security tools: <ul><li>Use the SECTOOLS menu for running programs interactively.</li>
<li>Use the SECBATCH menu for running programs in batch. The SECBATCH menu
has two parts: one for submitting jobs to the job queue immediately, and the
other for placing jobs on the job scheduler.</li>
</ul>
</div>
<div class="p">If you are using iSeries™ Navigator, follow these steps to run the
security tools: <ol><li>In iSeries Navigator,
expand your <span class="menucascade"><span class="uicontrol">Server</span> &gt; <span class="uicontrol">Security</span></span>.</li>
<li>Right-click <span class="uicontrol">Policies</span> and select <span class="uicontrol">Explore</span> to
display a list of policies you can create and manage.</li>
</ol>
</div>
<p>Review your security policy statement and your security memo to users as
you decide which monitoring tasks you need to perform regularly. The following
topics discuss several items to watch for, when monitoring authority: </p>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzamvmonitorauthlists.htm">Monitor authorization lists</a></strong><br />
How to use authorization lists to organize object groups based on security requirements</li>
<li class="ulchildlink"><strong><a href="rzamvmonitorprivobjauth.htm">Monitor private authority to objects</a></strong><br />
This article describes the SECBATCH menu options and security commands that you can use to monitor private authority to objects.</li>
<li class="ulchildlink"><strong><a href="rzamvmonitorpubobjauth.htm">Monitor public authority to objects</a></strong><br />
This article describes the SECBATCH menu options and security commands that you can use to monitor public authority to objects.</li>
<li class="ulchildlink"><strong><a href="rzamvmonitoruserenviron.htm">Monitor user environments</a></strong><br />
This article discusses using the SECBATCH menu and commands to monitor user environments.</li>
<li class="ulchildlink"><strong><a href="rzamvmonitorspecauth.htm">Monitor special authorities</a></strong><br />
This topic describes the SECBATCH menu options and commands used to monitor special authorities.</li>
<li class="ulchildlink"><strong><a href="rzamvmonsignon.htm">Monitor sign-on and password activity</a></strong><br />
If you are concerned about unauthorized attempts to enter your
system, you can use the <span class="cmdname">PRTUSRPRF</span> command to help you monitor
sign-on and password activity.</li>
<li class="ulchildlink"><strong><a href="rzamvmonactivity.htm">Monitor user profile activity</a></strong><br />
As a security administrator, you need to control and audit changes that occur to user profiles on your system.</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvmonitorsec.htm" title="This set of topics discuss various techniques for monitoring and auditing security on your system.">Monitor security</a></div>
</div>
</div>
</body>
</html>