80 lines
5.9 KiB
HTML
80 lines
5.9 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="General security system values" />
|
|
<meta name="abstract" content="General security system values provide the cornerstone for your security policy." />
|
|
<meta name="description" content="General security system values provide the cornerstone for your security policy." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvplansyslvlsec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvseclvl.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvretainsvrsec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvsharemem.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvremotesvcattribute.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvremotepwron.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvuseadoptauth.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvallowuser.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvauthnewobj.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvscanfilesys.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzamvqscanfsctl.htm" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="gensecsysval" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>General security system values</title>
|
|
</head>
|
|
<body id="gensecsysval"><a name="gensecsysval"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">General security system values</h1>
|
|
<div><p>General security system values provide the cornerstone for your
|
|
security policy.</p>
|
|
<p>General security system values allow you to set security function to support
|
|
the decisions you made when developing your security policy. For example,
|
|
in your security policy you state that systems containing confidential information,
|
|
such as customer accounts or payroll inventories, need a stricter level of
|
|
security than systems used for testing applications that are developed within
|
|
your company. You can then plan and set a security level on these
|
|
systems that corresponds with the decisions you made in your security policy.</p>
|
|
</div>
|
|
<div>
|
|
<ul class="ullinks">
|
|
<li class="ulchildlink"><strong><a href="rzamvseclvl.htm">Security level system value</a></strong><br />
|
|
This system value allows you to set the security level for the system.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvretainsvrsec.htm">Retain server security</a></strong><br />
|
|
This system value determines whether or not the security data needed by a server to authenticate a user on a target system through client-server interfaces can be retained on the host system.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvsharemem.htm">Share memory control</a></strong><br />
|
|
This system value determines whether or not to allow access to shared memory, or use mapped memory stream files.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvremotesvcattribute.htm">Remote service attribute</a></strong><br />
|
|
This system value allows you to analyze a system from an area other that where the system located.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvremotepwron.htm">Remote power-on and restart</a></strong><br />
|
|
This system value determines whether or not you will allow remote users to power-on and restart the system.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvuseadoptauth.htm">Use adopted authority</a></strong><br />
|
|
Adopted authority adds the authority of a program owner to the authority of the user running the program.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvallowuser.htm">Allow user domain objects</a></strong><br />
|
|
This system value specifies whether to allow user domain objects and where these objects will be located.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvauthnewobj.htm">Authority for new objects</a></strong><br />
|
|
This system value is used to determine the public authority for a newly created object.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvscanfilesys.htm">Scan file system</a></strong><br />
|
|
This system value can be used to specify whether file systems should be scanned using the integrated file system scan-related exit programs.</li>
|
|
<li class="ulchildlink"><strong><a href="rzamvqscanfsctl.htm">Scan file system control</a></strong><br />
|
|
The scan file systems control system value controls the integrated file system scanning that is enabled when exit programs are registered with any of the integrated file system scan-related exit points.</li>
|
|
</ul>
|
|
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansyslvlsec.htm" title="System security entails controlling user access and their privileges, maintaining information integrity, monitoring processes and access, auditing system functions, and providing backup and recovery of security related information.">Plan system security</a></div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html> |