76 lines
4.5 KiB
HTML
76 lines
4.5 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="concept" />
|
||
|
<meta name="DC.Title" content="System security tools" />
|
||
|
<meta name="abstract" content="You can use security tools to manage and monitor the security environment on your system." />
|
||
|
<meta name="description" content="You can use security tools to manage and monitor the security environment on your system." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvconcepts.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvtoolsecurity.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="sectools" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>System security tools</title>
|
||
|
</head>
|
||
|
<body id="sectools"><a name="sectools"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">System security tools</h1>
|
||
|
<div><p>You can use security tools to manage and monitor the security environment
|
||
|
on your system.</p>
|
||
|
<p>The security tools are part of i5/OS™. They consist of a set of commands
|
||
|
and programs that you manage through two main menus: </p>
|
||
|
<div class="p"><ul><li>The Security Tools (SECTOOLS) menu allows you to run security commands
|
||
|
interactively.</li>
|
||
|
<li>The Submit or Schedule Security Reports to Batch (SECBATCH) menu allows
|
||
|
you to run security report commands in batch mode.</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
<div class="p">You can use these security tools to work with user profiles, control security
|
||
|
auditing, print security reports, and customize your system security. For
|
||
|
example, you can use security user profile tools to help you do the following: <ul><li>Find out what user profiles have default passwords. </li>
|
||
|
<li>Schedule user profiles to be unavailable at certain times of the day or
|
||
|
week. </li>
|
||
|
<li>Schedule a user profile to be removed when the employee leaves. </li>
|
||
|
<li>Find out which user profiles have special authorities. </li>
|
||
|
<li>Find out who adopts authority to objects on the system.</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
<p>You can the object security tools to track the public and private authorities
|
||
|
that are associated with confidential objects. You can set these reports to
|
||
|
print at regular intervals to help you focus your security efforts on current
|
||
|
issues. You can also run reports to display only the changes since the last
|
||
|
time you ran the report. </p>
|
||
|
<div class="p">Other tools provide the ability to monitor: <ul><li>Trigger programs</li>
|
||
|
<li>Security-relevant values in communications entries, subsystem descriptions,
|
||
|
output queues, job queues, and job descriptions</li>
|
||
|
<li>Altered or tampered programs</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
<p>For more information on using system security tools, see <span class="q">"Appendix
|
||
|
G. Commands and menus for security commands"</span> in the <cite>iSeries™ Security
|
||
|
Reference</cite>.</p>
|
||
|
</div>
|
||
|
<div>
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvconcepts.htm" title="To effectively create a security policy and plan security measures for your system, you need to understand the following security concepts, some of which are general concepts and some of which are specific to the hardware type.">Concepts</a></div>
|
||
|
</div>
|
||
|
<div class="relconcepts"><strong>Related concepts</strong><br />
|
||
|
<div><a href="rzamvtoolsecurity.htm" title="This information describes how to set up your system to use the security tools that are part of i5/OS.">Configure the system to use security tools</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|