[OpenVMS documentation]
[Site home] [Send comments] [Help with this site] [How to order documentation] [OpenVMS site] [Compaq site]
Updated: 11 December 1998

OpenVMS Guide to System Security


Previous Contents Index

H
Hardcopy output
    disposal of
Hardcopy terminals, logout considerations
Hidden attribute
High-water marking #1
High-water marking #2
High-water marking #3
    C2 systems and
    performance and
Holder Hidden attribute
Holders of a rights identifier
    associating with identifier
    displaying records
    granting access to
    removing from rights database
HSC console terminals
    C2 system requirements
    C2 system restrictions
HSM (Hierarchical Shelving Manager)
    not in C2 evaluation
I
I/O channels, access requirements #1
I/O channels, access requirements #2
I/O operations, access requirements for devices
Identifier ACEs
    ACE order
    adding to an ACL
    conditionalizing
    conditionalizing access
    creating
    Default attribute
    denying access
    format
    interpreting
    protected subsystems and
    using general identifiers
Identifier attributes
    description of
    Dynamic
    Holder Hidden
    Name Hidden
    No Access
    Resource
    Subsystem
Identifiers
    adding to rights database
    as directory owners
    as file owners #1
    as file owners #2
    assigning to users
    auditing use of
    creating
    customizing
    displaying process
    environmental #1
    environmental #2
    environmental #3
    environmental #4
    facility
    format
    general #1
    general #2
    general #3
    in ACEs
    of a process
    protected subsystems and
    removing
    reserved
    resource, directory ownership and
    security audit reports and
    types
    UIC #1
    UIC #2
    uniqueness requirement
Images
    installing
        security ramifications
        subsystem images
Images, installing
    security ramifications #1
    security ramifications #2
    subsystem images
IMPERSONATE privilege
IMPORT privilege
INBOUND parameter for node type specification
Incoming proxy access, enabling or disabling
INITIALIZE command, /ERASE qualifier #1
INITIALIZE command, /ERASE qualifier #2
Install utility (INSTALL)
    alarms
    auditing changes made through
    security ramifications #1
    security ramifications #2
Interactive accounts
Interactive identifiers
Interactive logins
    classes
    dialup #1
    dialup #2
    local
    remote
    system message
Interactive mode
    processes
Intrusion databases
Intrusions
    attempts
    detection
        counteraction through dual passwords
        database
        evasive procedures
        reporting events
        setting exclusion period
        system parameters for
J
Job controllers
    affected by shift restrictions
    enforcing work time restrictions
Job terminations imposed by shift restrictions
Journal flush
L
Last login messages
    disabling
LASTport and LASTport/DISK protocols
    not in C2 evaluation
LAT protocol
    not in C2 evaluation
LGI system parameters
    controlling login attempts
    LGI_BRK_DISUSER
    LGI_BRK_LIM
    LGI_BRK_TERM
    LGI_BRK_TMO
    LGI_CALLOUTS
    LGI_HID_TIM
    LGI_RETRY_LIM
    LGI_RETRY_TMO
    LGI_TWD_TMO
/LGICMD qualifier and captive accounts
Lifetime of accounts
Lifetime of passwords #1
Lifetime of passwords #2
Limited-access accounts
LINK command, /NOTRACEBACK qualifier
Links
    terminating dynamic asynchronous
Listener devices
    capturing audit event messages
    disabling
    example of programs for
LOAD_PWD_POLICY system parameter
Local identifiers
/LOCAL_PASSWORD qualifier
Lock access
LOCKPWD flag
Logging
    access to protected objects
    security audit events #1
    security audit events #2
    terminal sessions
Logging out
    breaking dialup connection
    deciding when it is necessary
    from disconnected processes
    reasons for
    security considerations #1
    security considerations #2
Logical I/O access
Logical name tables
    as protected objects
    events audited
    privilege requirements
    reestablishing security profile
    security elements of
    template profiles
    types of access
Logical names
    defining for external authentication
Login alarms
    enabling
Login classes
    batch
    dialup
    interactive
    local
    network
    noninteractive
    remote
    restrictions on
Login command procedures
    for restricted accounts #1
    for restricted accounts #2
    proper protection for
Login failures
    alarms
    auditing
    break-in evasion and
    causes of
    dialup logins
    expired accounts
    login class restrictions and
    messages #1
    messages #2
    password grabber programs #1
    password grabber programs #2
    retries and
    security audit report and
    shift restrictions
    system passwords and
Login messages
    announcement
    controlling #1
    controlling #2
    disconnected job
    expired password #1
    expired password #2
    last successful interactive login
    last successful noninteractive login
    new mail
    number of login failures
    suppressing #1
    suppressing #2
    welcome
Login programs, authentication by secure terminal server
Logins
    auditing
    batch
    changing password
    changing password during
    controlling
    default process protection and
    dialup
        supplying password
    disabled
        by break-in evasion
        by shift restriction
    expired accounts
    flags
    interactive
        classes of
        most recent
    local
    monitoring last
    network
    noninteractive
        classes of
        most recent
    permitted time periods
    remote
    restricting with system passwords
    secure terminal server #1
    secure terminal server #2
    security implications
    simplifying for user with Automatic login facility (ALF)
    system parameters controlling
    time out
    with external authentication
Logout alarms
Logout auditing
LOGOUT command
    /HANGUP qualifier
LOG_IO privilege #1
LOG_IO privilege #2


Previous Next Contents Index

[Site home] [Send comments] [Help with this site] [How to order documentation] [OpenVMS site] [Compaq site]
[OpenVMS documentation]

Copyright © Compaq Computer Corporation 1998. All rights reserved.

Legal
6346PRO_INDEX_003.HTML