HP Sentry User Manual
Page 3

Table Of Contents
USING THIS GUIDE---------------------------------------------------------------------------------------- Intro - 1
USING THE SCREENS ------------------------------------------------------------------------------------ Intro - 3
INSTALLING SENTRY ------------------------------------------------------------------------------------ Intro - 5
GETTING STARTED--------------------------------------------------------------------------------------- Intro - 8
INTRODUCING THE MAIN MENU ------------------------------------------------------------------Intro - 12
1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU----------- 1 - 1
1.0 DATABASE CREATION AND VALUDATION MENU------------------------------------------- 1 - 2
1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX----------------------------------------- 1 - 4
1.2 CREATE DATABASE FROM FILE SYSTEM ------------------------------------------------------ 1 - 6
1.3 VALIDATE THE USER PROFILE DATABASE ---------------------------------------------------- 1 - 7
2. INTRODUCING THE DATABASE MAINTENANCE MENU -------------------------------- 2 - 1
2.0 DATABASE MAINTENANCE-------------------------------------------------------------------------- 2 - 2
2.1 SYSTEM PROFILE MAINTENANCE ---------------------------------------------------------------- 2 - 4
2.2 USER MAINTENANCE --------------------------------------------------------------------------------- 2 - 10
2.3 GROUP MAINTENANCE------------------------------------------------------------------------------- 2 - 18
2.4 FILE SYSTEM--------------------------------------------------------------------------------------------- 2 - 23
ACLs Maintenance------------------------------------------------------------------------------------------- 2 - 28
More File Manager Views ---------------------------------------------------------------------------------- 2 - 31
2.5 COMMAND MAINTENANCE------------------------------------------------------------------------- 2 - 34
2.6 USER ITEM PROTECTION MAINTENANCE----------------------------------------------------- 2 - 38
3. INTRODUCING THE REPORTS MENU -------------------------------------------------------------- 3 - 1
3.0 REPORTS MENU------------------------------------------------------------------------------------------ 3 - 2
3.1 SYSTEM PROFILE REPORT --------------------------------------------------------------------------- 3 - 4
3.2 USER PROFILES ------------------------------------------------------------------------------------------ 3 - 9
3.3 GROUPS REPORT --------------------------------------------------------------------------------------- 3 - 11
3.4 ACCOUNT PROTECTION REPORT----------------------------------------------------------------- 3 - 13
3.5 COMMAND PROTECTION REPORT --------------------------------------------------------------- 3 - 15
3.6 ACCESS VIOLATIONS REPORT--------------------------------------------------------------------- 3 - 17
4. INTRODUCING THE UTILITIES MENU ------------------------------------------------------------- 4 - 1
4.0 UTILITIES MENU ----------------------------------------------------------------------------------------- 4 - 2
4.1 VOC PROTECTION SETUP ---------------------------------------------------------------------------- 4 - 4
4.2 PUGING THE VIOLATIONS LOG -------------------------------------------------------------------- 4 - 5
4.3 PASSWORD CREATION -------------------------------------------------------------------------------- 4 - 7
4.4 REBUILD CROSS REFERENCE FILES ------------------------------------------------------------- 4 - 10
4.5 UPDATE PROTECTED COMMANDS--------------------------------------------------------------- 4 - 11
APPENDIX 1 ---------------------------------------------------------------------------------------------Appendix - 1
SENTRY INTERNAL SUBROUTINES----------------------------------------------------------- Appendix - 1
Subroutine: SENTRY.ENCRYPT------------------------------------------------------------------ Appendix - 1
DATA ENCRYPTION------------------------------------------------------------------------------- Appendix - 2
Subroutine: SENTRY.USER.ITEM.CONTROL------------------------------------------------- Appendix - 3
Subroutine: SENTRY.VIOLATION.STAMP----------------------------------------------------- Appendix - 6
APPENDIX 2 ------------------------------------------------------------------------------------------ Appendix 2 - 1
SENTRY KEY BINDINGS ------------------------------------------------------------------------ Appendix 2 - 1