ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvmonitorqueueaccess.htm

60 lines
4.0 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Monitor access to output and job queues" />
<meta name="abstract" content="This article describes how to monitor access to output and job queues, explains why it is important, and provides step-by-step instructions." />
<meta name="description" content="This article describes how to monitor access to output and job queues, explains why it is important, and provides step-by-step instructions." />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorsec.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="monitorqueueaccess" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Monitor access to output and job queues</title>
</head>
<body id="monitorqueueaccess"><a name="monitorqueueaccess"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Monitor access to output and job queues</h1>
<div><p>This article describes how to monitor access to output and job
queues, explains why it is important, and provides step-by-step instructions.</p>
<p>Sometimes a security administrator does a great job of protecting access
to files and then forgets about what happens when the contents of a file are
printed. Servers provide functions for you to protect sensitive output queues
and job queues. You protect an output queue so that unauthorized users cannot,
for example, view or copy confidential spooled files that are waiting to print.
You protect job queues so that an unauthorized user cannot either redirect
a confidential job to a nonconfidential output queue or cancel the job entirely.</p>
<p>You can use the following SECBATCH menu options to print the security settings
for the job queues and output queues on your system: <kbd class="userinput">24</kbd> to
submit the job immediately and <kbd class="userinput">63</kbd> to use the job scheduler.
You also can use the Print Queue Authority (PRTQAUT) command to print the
security settings for the job queues and output queues on your system. You
can then evaluate printing jobs that print confidential information and ensure
that they are going to output queues and job queues that are protected.</p>
<p>For more information on the PRTQAUT command, see Appendix A, and for output
queues and job queues that you consider to be security-sensitive, you can
compare your security settings with the required output queue and job queue
function settings in the <span class="q">"Job Queue Commands"</span> and <span class="q">"Output Queue Commands"</span> tables
in Appendix D of the <a href="../rzahg/rzahgsecref.htm">iSeries™ Security
Reference</a>.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvmonitorsec.htm" title="This set of topics discuss various techniques for monitoring and auditing security on your system.">Monitor security</a></div>
</div>
</div>
</body>
</html>