SENTRY User’s Guide
Section 3 - 3
Fitzgerald & Long
Selection five
Command Protection
, is the same information as selection four except the report is
sorted by the name of the command which is protected. A list of accounts where that command is protected
is displayed.
Choosing selection six,
Access Violations
, prints the SENTRY Violations Log. Entries are printed in
chronological order. Each record includes date, time, port number, USER ID, pathname and the protected
command which was executed creating the violation.
In the following sections, each report is described and an example is provided.
Содержание Sentry
Страница 4: ......
Страница 18: ......
Страница 21: ...SENTRY User s Guide Section 1 3 Fitzgerald Long ...
Страница 29: ...SENTRY User s Guide Section 1 11 Fitzgerald Long ...
Страница 30: ......
Страница 60: ...Section 2 30 SENTRY User s Guide Fitzgerald Long ...
Страница 102: ......
Страница 109: ...SENTRY User s Guide Appendix 1 7 Fitzgerald Long ...
Страница 110: ......
Страница 113: ...SENTRY User s Guide Appendix 2 3 Fitzgerald Long ...