12.07.2015 Views

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

eTrust CA-Top Secret Security for z/OS and OS ... - SupportConnect

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Tracing UNIX System Services (OMVS)Stopping the SECTRACE <strong>for</strong> OMVSTo disable the SECTRACE <strong>for</strong> OMVS, issue the following comm<strong>and</strong>, where xxxxis the identifier assigned to the SECTRACE:ST DISABLE,ID=XXXX,ENDYou can restart a disabled trace by entering an enable comm<strong>and</strong>. To start adisabled trace, issue the following comm<strong>and</strong>, where xxxx is the identifierassigned to the SECTRACE:ST ENABLE,ID=XXXX,ENDTo stop the SECTRACE <strong>for</strong> OMVS, issue the following comm<strong>and</strong>, where xxxx isthe identifier assigned to the SECTRACE:ST DEL,ID=XXXX,ENDUNIX System Services ReportingTSSOERPT UtilityAuthority <strong>and</strong> ScopeThe batch utility program, TSSOERPT, processes security-related activityrecorded in SMF data sets. To monitor user activity in a UNIX System Servicesenvironment, <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> logs security events under UNIX SystemServices to SMF using the st<strong>and</strong>ard <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> SMF record. Logrecords are written <strong>for</strong> any security event that denies the acid access to a UNIXSystem Services facility. These records can assist you in determining the UID <strong>and</strong>GID of the acid involved in the attempted access.<strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> per<strong>for</strong>ms authorization checking to determine whether theperson submitting the TSSOERPT job is authorized to view or manipulate theinput SMF data. You can only extract those incidents that are generated <strong>for</strong> acidswithin the scope of your authority. The scopes are:■■■■■■S<strong>CA</strong>—every eventLS<strong>CA</strong>—every event within the LS<strong>CA</strong>s scopeZ<strong>CA</strong>—entire zone or specific divisions, departments or acids within the zoneV<strong>CA</strong>—entire division or specific departments or acids within the divisionD<strong>CA</strong>—entire department or specific acids within the departmentUSER—himselfImplementing <strong>eTrust</strong> <strong>CA</strong>-<strong>Top</strong> <strong>Secret</strong> in a z/<strong>OS</strong> or <strong>OS</strong>/390 Environment 1–21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!