ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvmanagesec.htm

85 lines
6.3 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Manage security" />
<meta name="abstract" content="Once you've planned and implemented your security strategy, there remains the task of managing the security of your system." />
<meta name="description" content="Once you've planned and implemented your security strategy, there remains the task of managing the security of your system." />
<meta name="DC.Relation" scheme="URI" content="rzamvplansec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvrestrictsaverestore.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsavesecinfo.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvrestoresecinfo.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmanagesecinfo.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvtoolsecurity.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsecurityexit.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmanagesvctoolsid.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvprotectagainstviruses.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvuseprtpubaut.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvuseprtpvtaut.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvauditrpt.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="managesec" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Manage security</title>
</head>
<body id="managesec"><a name="managesec"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Manage security</h1>
<div><p>Once you've planned and implemented your security strategy, there
remains the task of managing the security of your system. </p>
<div class="p">These topics will guide you through setting up your security management
plan:<ul><li>Back up and recover security information</li>
<li>Manage security information</li>
<li>Manage service tools user IDs</li>
<li>Protect against computer viruses</li>
</ul>
</div>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzamvrestrictsaverestore.htm">Restrict save and restore capability</a></strong><br />
Part of your security system should be controlling users' save and restore capabilities.</li>
<li class="ulchildlink"><strong><a href="rzamvsavesecinfo.htm">Save security information</a></strong><br />
This topic presents an overview of how you save and restore security information.</li>
<li class="ulchildlink"><strong><a href="rzamvrestoresecinfo.htm">Restore security information</a></strong><br />
Recovering your system often requires restoring data and associated security information.</li>
<li class="ulchildlink"><strong><a href="rzamvmanagesecinfo.htm">Manage security information</a></strong><br />
This article describes the tasks for managing security information.</li>
<li class="ulchildlink"><strong><a href="rzamvtoolsecurity.htm">Configure the system to use security tools</a></strong><br />
This information describes how to set up your system to use the
security tools that are part of i5/OS™. </li>
<li class="ulchildlink"><strong><a href="rzamvsecurityexit.htm">Use security exit programs</a></strong><br />
Some system functions provide an exit so that your system can run a user-created program to perform additional checking and validation. For example, you can set up your system to run an exit program every time that someone attempts to open a DDM (distributed data management) file on your system.</li>
<li class="ulchildlink"><strong><a href="rzamvmanagesvctoolsid.htm">Manage service tools user ID</a></strong><br />
This article describes how to manage service tool user IDs using
DST, SST, and iSeries™ Navigator.</li>
<li class="ulchildlink"><strong><a href="rzamvprotectagainstviruses.htm">Protect against computer viruses</a></strong><br />
This article provides some tips for protecting against computer viruses and suspicious programs.</li>
<li class="ulchildlink"><strong><a href="rzamvuseprtpubaut.htm">Use the Print Publicly Authorized Objects command (PRTPUBAUT)</a></strong><br />
This article describes how to use the print publicly authorized objects commands (PRTPUBAUT), explains why it is important, and provides step-by-step instructions.</li>
<li class="ulchildlink"><strong><a href="rzamvuseprtpvtaut.htm">Use the Print Private Authorities command (PRTPVTAUT)</a></strong><br />
This article describes how to use the print private authorities command (PRTPVTAUT), explains why it is important, and provides step-by-step instructions.</li>
<li class="ulchildlink"><strong><a href="rzamvauditrpt.htm">Use the Print System Security Attributes command (PRTSYSSECA)</a></strong><br />
</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansec.htm" title="This topic collection provides you with detailed information about planning, setting up, and using your system security. This topic collection combines the information formerly in the Basic system security and planning topic collection and in the Tips and Tools for Securing Your iSeries manual.">Plan and set up system security</a></div>
</div>
</div>
</body>
</html>