skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of chapter: System Security Breaches System Security Breaches
go to previous page: Indications of Trouble Indications of Trouble
go to next page: Handling a Security BreachHandling a Security Breach
end of book navigation links

Routine System Surveillance  



The operating system provides a number of mechanisms that allow systematic surveillance of the activity in your system. There are many mechanisms available for monitoring the system either manually or by user-written command procedures, for example:

Proper use of such mechanisms should help you verify settings, alert you to problems, and allow you to intervene. This section describes the most important system surveillance mechanisms--ACCOUNTING and ANALYZE/AUDIT.

System Accounting  

You can learn what the normal pattern of resource use is by studying reports of the Accounting utility (ACCOUNTING). To obtain a report, you run the utility image SYS$SYSTEM:ACC.EXE. The resulting data file is SYS$MANAGER:ACCOUNTNG.DAT. Review ACCOUNTING reports because they can provide early indications of problems. Check for the following:

Security Auditing  

As the security administrator, you can have the operating system report on security-related activity by enabling categories of events for auditing using the DCL command SET AUDIT. Using the Audit Analysis utility (ANALYZE/AUDIT), you can periodically review event messages collected in the security audit log file. (See Security Auditing for a full description of the process.)

The operating system can send event messages to an audit log file or to an operator terminal. You define whether events are reported as audits or alarms in the following way:

Because security auditing affects system performance, enable auditing only for the most important events. The following security-auditing actions are presented in order of decreasing priority and increasing system cost:

  1. Enable security auditing for login failures and break-ins. This is the best way to detect probing by outsiders (and insiders looking for accounts). All sites needing security should enable alarms for these events.
  2. Enable security auditing for logins. Auditing successful logins from the more suspicious sources like remote and dialup users provides the best way to track which accounts are being used. An audit record is written before users logging in to a privileged account can disguise their identity.
  3. Enable security auditing for unsuccessful file access (ACCESS=FAILURE). This technique audits all file-protection violations and is an excellent method of catching probers.
  4. Apply ACL-based file access auditing to detect write access to critical system files. The most important files to audit are shown in System Files Benefiting from ACL-Based Auditing. ( Access Control Entries (ACEs) for Security Auditing presents an example of how to establish security entries in ACLs.) You may want to audit only successful access to these files to detect penetration, or you may want to audit access failures to detect probing as well.

    Note that some of the files in System Files Benefiting from ACL-Based Auditing are written during normal system operation. For example, SYSUAF.DAT is written during each login, and SYSMGR.DIR is written when the system boots.

    Table 1   System Files Benefiting from ACL-Based Auditing
    Device and Directory File Name
    SYS$SYSTEM
    AUTHORIZE.EXE

    F11BXQP.EXE

    LOGINOUT.EXE

    DCL.EXE

    JOBCTL.EXE

    SYSUAF.DAT

    NETPROXY.DAT

    RIGHTSLIST.DAT

    STARTUP.COM

    VMS$OBJECTS.DAT
    SYS$LIBRARY
    SECURESHR.EXE

    SECURESHRP.EXE
    SYS$MANAGER
    VMS$AUDIT_SERVER.DAT

    SY*.COM

    VMSIMAGES.DAT
    SYS$SYSROOT
    [000000]SYSEXE.DIR

    [000000]SYSLIB.DIR

    [000000]SYS$LDR.DIR

    [000000]SYSMGR.DIR

  5. Enable security auditing for modifications to system parameters or the known file list (/ENABLE=(SYSGEN,INSTALL) ).
  6. Audit use of privilege to access files (either write access or all forms of access). Implement the security audit with the keywords ACCESS=(SYSPRV,BYPASS,READALL,GRPPRV). Note that this class of auditing can produce a large volume of output because privileges are often used in normal system operation for such tasks as mail delivery and operator backups.

Developing an Auditing Plan provides further discussion of recommended sets of security events to audit.


go to previous page: Indications of Trouble Indications of Trouble
go to next page: Handling a Security BreachHandling a Security Breach