skip book previous and next navigation links
go up to top of book: HP OpenVMS System Manager's Manual, Volume 1:... HP OpenVMS System Manager's Manual, Volume 1:...
go to previous page: Troubleshooting Troubleshooting
go to next page: Understanding Security ManagementUnderstanding Security Management
end of book navigation links

12Security Considerations  



This chapter outlines the security features available with the OpenVMS operating system and suggests procedures to reduce the threat of a break-in on your system or cluster. It also tells how to use the access control list editor (ACL editor) to create and modify access control list entries (ACEs) on protected objects. For a more detailed description of security management, refer to the HP OpenVMS Guide to System Security .

Information Provided in This Chapter



This chapter describes the following tasks:

Task Section
Managing passwords
Managing Passwords
Adding to the system password dictionary
Initial Passwords
Setting up intrusion detection
Using Intrusion Detection Mechanisms
Interpreting a user identification code (UIC)
Interpreting a User Identification Code
Parsing a protection code
Understanding Protection Codes
Creating access control lists (ACLs)
Creating Access Control Lists
Using the access control list editor (ACL editor)
Using the ACL Editor
Auditing security-relevant events
Enabling Classes of Security Alarms



This chapter explains the following concepts:

Concept Section
What security management involves
Understanding Security Management
Aspects of password management
Managing Passwords
Ways to protect objects
Understanding Ways to Protect Objects
Construction of access control lists (ACLs)
Creating Access Control Lists
Audit log file analysis
Analyzing Audit Log Files



For full descriptions of all these tasks and concepts, refer to the HP OpenVMS Guide to System Security .

skip links to sections within this chapter.
Understanding Security Management
Managing Passwords
Using Intrusion Detection Mechanisms
Understanding Ways to Protect Objects
Creating Intra-Cluster Communications Security Objects
Creating Access Control Lists
Assigning ACLs
Using the ACL Editor
Auditing Security-Relevant Events
Analyzing Audit Log Files
end of content navigation links


go to previous page: Troubleshooting Troubleshooting
go to next page: Understanding Security ManagementUnderstanding Security Management