USING THIS GUIDE---------------------------------------------------------------------------------------- | Intro - 1 |
USING THE SCREENS ------------------------------------------------------------------------------------ | Intro - 3 |
INSTALLING SENTRY ------------------------------------------------------------------------------------ | Intro - 5 |
GETTING STARTED --------------------------------------------------------------------------------------- | Intro - 8 |
INTRODUCING THE MAIN MENU ------------------------------------------------------------------ | Intro - 12 |
1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU----------- | 1 - 1 |
1.0 | DATABASE CREATION AND VALUDATION MENU ------------------------------------------- | 1 | - 2 |
1.1 | UPLOAD USER AND GROUP PROFILES FROM UNIX ----------------------------------------- | 1 | - 4 |
1.2 | CREATE DATABASE FROM FILE SYSTEM ------------------------------------------------------ | 1 | - 6 |
1.3 | VALIDATE THE USER PROFILE DATABASE ---------------------------------------------------- | 1 | - 7 |
2. INTRODUCING THE DATABASE MAINTENANCE MENU -------------------------------- | 2 | - 1 |
2.0 | DATABASE MAINTENANCE-------------------------------------------------------------------------- | 2 | - 2 |
2.1 | SYSTEM PROFILE MAINTENANCE ---------------------------------------------------------------- | 2 | - 4 |
2.2 | USER MAINTENANCE --------------------------------------------------------------------------------- | 2 - 10 |
2.3 | GROUP MAINTENANCE------------------------------------------------------------------------------- | 2 - 18 |
2.4 | FILE SYSTEM--------------------------------------------------------------------------------------------- | 2 - 23 |
ACLs Maintenance ------------------------------------------------------------------------------------------- | 2 - 28 |
More File Manager Views ---------------------------------------------------------------------------------- | 2 - 31 |
2.5 | COMMAND MAINTENANCE------------------------------------------------------------------------- | 2 - 34 |
2.6 | USER ITEM PROTECTION MAINTENANCE----------------------------------------------------- | 2 - 38 |
3. INTRODUCING THE REPORTS MENU -------------------------------------------------------------- | 3 | - 1 |
3.0 | REPORTS MENU------------------------------------------------------------------------------------------ | 3 | - 2 |
3.1 | SYSTEM PROFILE REPORT --------------------------------------------------------------------------- | 3 | - 4 |
3.2 | USER PROFILES ------------------------------------------------------------------------------------------ | 3 | - 9 |
3.3 | GROUPS REPORT --------------------------------------------------------------------------------------- | 3 - 11 |
3.4 | ACCOUNT PROTECTION REPORT----------------------------------------------------------------- | 3 - 13 |
3.5 | COMMAND PROTECTION REPORT --------------------------------------------------------------- | 3 - 15 |
3.6 | ACCESS VIOLATIONS REPORT--------------------------------------------------------------------- | 3 - 17 |
4. INTRODUCING THE UTILITIES MENU ------------------------------------------------------------- | 4 | - 1 |
4.0 | UTILITIES MENU ----------------------------------------------------------------------------------------- | 4 | - 2 |
4.1 | VOC PROTECTION SETUP ---------------------------------------------------------------------------- | 4 | - 4 |
4.2 | PUGING THE VIOLATIONS LOG -------------------------------------------------------------------- | 4 | - 5 |
4.3 | PASSWORD CREATION -------------------------------------------------------------------------------- | 4 | - 7 |
4.4 | REBUILD CROSS REFERENCE FILES ------------------------------------------------------------- | 4 - 10 |
4.5 | UPDATE PROTECTED COMMANDS--------------------------------------------------------------- | 4 - 11 |
APPENDIX 1 --------------------------------------------------------------------------------------------- | Appendix - 1 |
SENTRY INTERNAL SUBROUTINES----------------------------------------------------------- | Appendix - 1 |
Subroutine: SENTRY.ENCRYPT------------------------------------------------------------------ | Appendix - 1 |
DATA ENCRYPTION------------------------------------------------------------------------------- | Appendix - 2 |
Subroutine: SENTRY.USER.ITEM.CONTROL------------------------------------------------- | Appendix - 3 |
Subroutine: SENTRY.VIOLATION.STAMP----------------------------------------------------- | Appendix - 6 |
APPENDIX 2 ------------------------------------------------------------------------------------------ | Appendix | 2 - 1 |
SENTRY KEY BINDINGS ------------------------------------------------------------------------ | Appendix 2 - 1 |