ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvmonitoraccess.htm

58 lines
3.5 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Monitor blatant access attempts" />
<meta name="abstract" content="Monitor access to output and job queues" />
<meta name="description" content="Monitor access to output and job queues" />
<meta name="DC.Relation" scheme="URI" content="rzamvdevelopintrusiondetectstrat.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="monitoraccess" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Monitor blatant access attempts</title>
</head>
<body id="monitoraccess"><a name="monitoraccess"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Monitor blatant access attempts</h1>
<div><p>Monitor access to output and job queues</p>
<p>Sometimes a security administrator does a great job of protecting access
to files and then forgets about what happens when the contents of a file are
printed. Servers provide functions for you to protect sensitive output queues
and job queues. You protect an output queue so that unauthorized users cannot,
for example, view or copy confidential spooled files that are waiting to print.
You protect job queues so that an unauthorized user cannot either redirect
a confidential job to a nonconfidential output queue or cancel the job entirely.</p>
<p>SECBATCH menu options</p>
<p>24 to submit immediately 63 to use the job scheduler </p>
<p>The Basic system security and planning in the Information Center and Security
Reference books describe how to protect your output queues and job queues.
You can use the Print Queue Authority (PRTQAUT) command to print the security
settings for the job queues and output queues on your system. You can then
evaluate printing jobs that print confidential information and ensure that
they are going to output queues and job queues that are protected.</p>
<p>For output queues and job queues that you consider to be security-sensitive,
you can compare your security settings to the information in Appendix D of
the Security Reference book: <a href="../rzahg/rzahgsecref.htm">iSeries™ Security
Reference</a>.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvdevelopintrusiondetectstrat.htm" title="The following information is a collection of tips to help you detect potential security exposures.">Prevent and detect security exposures</a></div>
</div>
</div>
</body>
</html>