CHAPTER 7 - TESTING YOUR SECURITY SETTINGS .................................................. 7.1
T
ESTING
S
AFE
N
ET
/400
SETTINGS BASED ON YOUR HISTORICAL DATA WITH THE ON
-
LINE
TRANSACTION TESTER
................................................................................................................. 7.2
B
ATCH
T
RANSACTION
T
EST
R
EVIEW
/R
EPORT
– S
ECURITY
R
EPORT BY
U
SER
................................. 7.6
R
ECOMMENDED APPROACH TO TESTING
...................................................................................... 7.9
PCREVIEW ............................................................................................................................ 7.10
CHAPTER 8 - BACKUPS AND PURGES.............................................................................. 8.1
L
OG FILE
P
URGE
........................................................................................................................ 8.1
A
UTOMATING THE LOG FILE PURGE
............................................................................................ 8.4
A
UTOMATING THE
O
NE
S
TEP
S
ECURITY
R
EPORT
......................................................................... 8.4
A
UTOMATING AND
R
UNNING THE
S
ECURITY
R
EPORT AND THE
L
OG
F
ILE
P
URGE
T
OGETHER
......... 8.5
D
AILY
B
ACKUP
P
ROCEDURE
....................................................................................................... 8.7
CHAPTER 9 - DE-ACTIVATING AND REMOVING SAFENET/400............................... 9.1
D
E
-
ACTIVATING
S
AFE
N
ET
/400 ................................................................................................... 9.1
R
EMOVING
S
AFE
N
ET
/400
FROM YOUR SYSTEM
............................................................................ 9.3
CHAPTER 10 - PROBLEM DETERMINATION ............................................................... 10.1
E
RROR
M
ESSAGE
R
ECEIVED ON THE
S
YSTEM I
5......................................................................... 10.1
E
RROR
M
ESSAGE
R
ECEIVED ON THE
C
LIENT
............................................................................. 10.3
E
XAMPLES OF
C
LIENT
E
RROR
M
ESSAGES
.................................................................................. 10.7
E
RROR
C
ODES WHICH
A
PPEAR IN THE
L
OG
............................................................................... 10.9
A
DDITIONAL
T
ROUBLESHOOTING
T
IPS
.................................................................................... 10.11
CHAPTER 11 - SPECIAL SAFENET/400 CONSIDERATIONS ...................................... 11.1
R
ESETTING
L
EVEL
5
WITHIN
S
AFE
N
ET
/400 ............................................................................... 11.1
P
RE
-P
OWER
D
OWN
P
ROGRAM
P
OINT
....................................................................................... 11.3
U
SING
A
UTOMATIC
A
LERT
N
OTIFICATION
................................................................................. 11.4
P
ROFILE
S
WAPPING
................................................................................................................. 11.6
J
OURNALING
S
AFE
N
ET
/400 S
ECURITY
F
ILES
............................................................................ 11.8
F
ILES
C
ONTAINED IN
S
AFE
N
ET
/400.......................................................................................... 11.9
S
AFE
N
ET
/400 C
OMMANDS
..................................................................................................... 11.11
CHAPTER 12 - SERVER FUNCTION DESCRIPTIONS .................................................. 12.1
O
RIGINAL
S
ERVERS
.................................................................................................................. 12.2
O
PTIMIZED
S
ERVERS
.............................................................................................................. 12.13