Index

The parenthesized number on an index entry indicates the location of the entry within the book. Entries before the first numbered section in a chapter are identified as Sec. n.0.


Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A

abbreviated audit reports (Sec. 3.5.2)

absolute permissions
        removing (Sec. 2.2.2.1.4)
        setting (Sec. 2.2.2.1.4)

accounting tools (Sec. 3.6)

accounts
        adding (Sec. A.1)

ACL
        archiving (Sec. 2.3.6.1)
        changing (Sec. 2.3.5.1)
        command interaction (Sec. 2.3.6)
        disabling (Sec. 2.3.1)
        enabling (Sec. 2.3.1)
        inheriting (Sec. 2.3.4)
        kernel status (Sec. 2.3.1)
        listing for files (Sec. 2.3.5.2)
        managing (Sec. 2.3.5)
        on NFS (Sec. 2.3.1.1)
        overview (Sec. 2.3)
        resource (Sec. 2.3)
        structure (Sec. 2.3.2)
        verifying status (Sec. 2.3.1)
        viewing (Sec. 2.3.5.1)

ACL entries
        adding (Sec. 2.3.5.3)
        modifying (Sec. 2.3.5.3)
        removing (Sec. 2.3.5.3)

aliases for audit events (Sec. 3.1.3.4)

application-specific auditing (Sec. 3.1.3.3)

applications
        adding to the file control database (Sec. A.5.3)

audgen command (Sec. 3.1.2.1)

audgen trusted event (Sec. 3.1.3.2)

audit (Sec. 3.1)
        See also audit subsystem
        accessing the graphic interface (Sec. 3.1.2.2)
        accounting tools (Sec. 3.6)
        application-specific auditing (Sec. 3.1.3.3)
        audgen command (Sec. 3.1.2.1)
        audit hosts file (Sec. 3.2.1)
        audit hub (Sec. 3.2.1)
        Audit Manager (Sec. 3.1.2.2)
        audit mask (Sec. 3.1.3)
        auditconfig command (Sec. 3.1.2.1)
        auditd command (Sec. 3.1.2.1)
        auditing remotely (Sec. 3.2.1)
        auditmask command (Sec. 3.1.2.1)
        audit_tool command (Sec. 3.1.2.1)
        AUID (audit ID) (Sec. 3.1.4)
        CDE interface (Sec. 3.1.2.2)
        commands (Sec. 3.1.2.1)
        configuration (Sec. 3.2)
        console messages (Sec. 3.1.1)
        content of records (Sec. 3.1.4)
        crash recovery (Sec. 3.3.4)
        data recovery (Sec. 3.3.4)
        dependencies among audit events (Sec. 3.5.3)
        disable events (Sec. 3.4.4)
        displaying audit records (Sec. 3.5)
        /etc/sec/auditd_clients file (Sec. 3.2.1)
        events
                preselection (Sec. 3.4.6)
                site-defined events (Sec. 3.1.3.3)
                state-dependent information (Sec. 3.5.3)
                trusted events (Sec. 3.1.3.2)
        files (Sec. 3.1.1)
                site_events file (Sec. 3.1.3.3)
        graphic interface (Sec. 3.1.2.2)
        GUI (Sec. 3.1.2.2)
        ID (AUID) (Sec. 3.1.4)
        implementation notes (Sec. 3.1.3.1)
        log files (Sec. 3.1.1)
        log files (Sec. 3.5)
        logging tools (Sec. 3.6)
        login audit mask
                setting (Sec. 3.1.3)
        LUID (login ID) (Sec. 3.1.4)
        managing data (Sec. 3.4.6)
        managing growth of data (Sec. 3.4.6)
        messages (Sec. 3.1.1)
        network audit hosts file (Sec. 3.2.1)
        networked auditing (Sec. 3.2.1)
        overview (Sec. 3.1)
        preselection (Sec. 3.4.6)
        record content (Sec. 3.1.4)
        reports, abbreviated (Sec. 3.5.2)
        responding to audit reports (Sec. 3.8)
        selecting events (Sec. 3.3)
        selecting events (Sec. 3.4)
        self-auditing commands (Sec. 3.1.3.2)
        site-defined events (Sec. 3.1.3.3)
        starting (Sec. 3.3.2)
        stopping (Sec. 3.3.2)
        suspending (Sec. 3.3.2)
        sysman auditconfig command (Sec. 3.1.2.1)
        trusted events (Sec. 3.1.3.2)
        user audit mask
                setting (Sec. 3.1.3)

audit events
        aliases for audit events (Sec. 3.1.3.4)
        displaying (Sec. 3.4.2)
        managing audit events (Sec. 3.4.6)
        site-defined (Sec. 3.1.3.3)
        trusted audit events (Sec. 3.1.3.2)

audit ID (AUID) (Sec. 3.1)
audit ID (AUID) (Sec. 3.1.4)

Audit Manager graphic interface (Sec. 3.1.2.2)

audit records
        displaying (Sec. 3.5)

audit subsystem
        configuring (Sec. 3.2)

auditable events (Sec. 3.1.3)

auditconfig command (Sec. 3.1.2.1)

auditconfig trusted event (Sec. 3.1.3.2)

auditd command (Sec. 3.1.2.1)

auditing
        in a TruCluster (Sec. 3.7)

auditing for applications (Sec. 3.1.3.3)

auditmask command (Sec. 3.1.2.1)

audit_daemon_exit trusted event (Sec. 3.1.3.2)

audit_log_change trusted event (Sec. 3.1.3.2)

audit_log_create trusted event (Sec. 3.1.3.2)

audit_log_overwrite trusted event (Sec. 3.1.3.2)

audit_reboot trusted event (Sec. 3.1.3.2)

audit_start trusted event (Sec. 3.1.3.2)

audit_stop trusted event (Sec. 3.1.3.2)

audit_subsystem
        event aliases (Sec. 3.1.3.4)

audit_suspend trusted event (Sec. 3.1.3.2)

audit_tool command (Sec. 3.1.2.1)

audit_xmit_fail trusted event (Sec. 3.1.3.2)

authck program (Sec. A.5.2)

authenticating users
        enhanced security (Sec. A.5)

authentication
        advanced server for UNIX (Sec. 1.4.5)
        certificates (Sec. 1.2.3.1)
        digital signatures (Sec. 1.2.3.1)
        host-based (Sec. 1.2.2)
        IPsec overview (Sec. 1.4.6)
        Kerberos overview (Sec. 1.4.4)
        overview (Sec. 1.1)
        passwords (Sec. 1.2.1)
        public key (Sec. 1.2.3)
        secret keys (Sec. 1.2.4)
        Secure Shell overview (Sec. 1.4.3)

authentication configuration
        maximum login attempts (Sec. A.2.2.4)
        password aging (Sec. A.2.2.1)
        password change time (Sec. A.2.2.2)
        password-changing controls (Sec. A.2.2.3)

authentication profile (Sec. A.3.1)
authentication profile (Sec. A.9.2.1)

auth_event trusted event (Sec. 3.1.3.2)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

B

backup procedures (Sec. A.9)

Berkeley database (Sec. A.4)

binary numbers
        in permissions (Sec. 2.2.2.2)

boot loading software (Sec. A.9.2.12)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

C

C2 features
        password control (Sec. 1.3.2.2)

changing
        directory permissions (Sec. 2.2.2.1.2)

chmod command (Sec. 2.2.2)

clusters
        distributed logins (Sec. A.7.4)
        NIS (Sec. A.7.4)
        upgrades (Sec. A.7.1)

commands
        chmod (Sec. 2.2.2)
        umask (Sec. 2.2.3)

configuration
        audit (Sec. 3.2)
        password aging (Sec. A.2.2.1)
        password change time (Sec. A.2.2.2)
        password-changing controls (Sec. A.2.2.3)

configuring
        audit subsystem (Sec. 3.2)
        SIA (Sec. 1.5.2)

console file (Sec. A.9.2.8)

console messages
        audit (Sec. 3.1.1)

content of audit records (Sec. 3.1.4)

crash recovery
        audit data (Sec. 3.3.4)

creacct command
        syntax (Sec. C.7.4)
        using (Sec. C.7.4)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

D

data loss (Sec. A.9)

databases (Sec. A.4)
        enhanced password (Sec. A.9.2.1)
        file control (Sec. A.5.3)
        groups (Sec. A.9.2.6)

default permissions
        setting (Sec. 2.2.3)

default user mask (umask) (Sec. 2.2.3)

defaults database (Sec. A.3.2)

dependencies among audit events (Sec. 3.5.3)

/dev/console file (Sec. A.9.2.8)

/dev/pts/* file (Sec. A.9.2.9)

/dev/tty* file (Sec. A.9.2.9)

device assignment database (Sec. A.5)

devices (Sec. A.8.1)
        database (Sec. A.3.5)
        databases (Sec. A.8.2)
        installation (Sec. A.8.1)

directories
        changing permissions (Sec. 2.2.2.1.2)

displaying
        audit events (Sec. 3.4.2)
        audit records (Sec. 3.5)

distributed logins in a cluster (Sec. A.7.4)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

E

encrypted password (Sec. A.9.2.1)

encryption (Sec. 1.2.5)

enhanced password database (Sec. A.3.1)
enhanced password database (Sec. A.9.2.1)

enhanced security (Sec. 1.3.2)
        aging configuration (Sec. A.2.2.1)
        authenticating in a TruCluster (Sec. A.7.5)
        authenticating users (Sec. A.5)
        centralized account management (Sec. A.6)
        configuring in a TruCluster (Sec. A.7.2)
        controls configuration (Sec. A.2.2.3)
        encryption (Sec. A.2.2.12)
        failed login records (Sec. A.2.2.9)
        features (Sec. 1.3.2)
        installing (Sec. A.1)
        installing in a TruCluster (Sec. A.7.2)
        login features (Sec. 1.3.2.1)
        login records configuration (Sec. A.2.2.7)
        maximum login attempts (Sec. A.2.2.4)
        minimum time configuration (Sec. A.2.2.2)
        NIS (Sec. A.6)
        NIS client setup (Sec. A.6.4)
        NIS master server setup (Sec. A.6.2)
        NIS migration (Sec. A.6.5)
        NIS slave server setup (Sec. A.6.3)
        profile migration (Sec. A.2.2.10)
        removing NIS (Sec. A.6.6)
        security (Sec. A.2.2)
        successful login records (Sec. A.2.2.8)
        templates for NIS user accounts (Sec. A.6.1)
        templates for user accounts (Sec. A.5.1)
        time between login attempts (Sec. A.2.2.5)
        time between logins (Sec. A.2.2.6)
        troubleshooting NIS (Sec. A.6.8)
        vouching (Sec. A.2.2.11)

enhanced security databases (Sec. A.3)

/etc/auth/system/default file (Sec. A.9.2.3)

/etc/auth/system/devassign file (Sec. A.9.2.4)

/etc/auth/system/ttys.db file (Sec. A.9.2.2)

/etc/group file (Sec. A.9.2.6)

/etc/passwd file (Sec. A.9.2.5)

/etc/sec/auditd_clients file (Sec. 3.2.1)

/etc/sec/event_aliases file (Sec. 3.1.3.4)

/etc/sec/site_events file (Sec. 3.1.3.3)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

F

file attributes (Sec. A.9.3)

file control database (Sec. A.5.3)
        description (Sec. A.3.4)
        location (Sec. A.5)

files
        required (Sec. A.9.2)
        restricting access (Sec. 2.2.3)

fverfy command (Sec. A.9.3)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

G

graphic interface
        for audit subsystem (Sec. 3.1.2.2)

group database (Sec. A.9.2.6)

groups
        database file (Sec. A.9.2.6)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

I

installing
        enhanced security (Sec. A.2.2)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

K

.k5login file
        entry format (Sec. C.5.4)
        sample (Sec. C.5.4)

Kerberos
        authentication (Sec. C.2)
        client (Sec. C.1)
        realms (Sec. C.2)
        server (Sec. C.1)

krb.conf file
        entry order (Sec. C.5.1)
        sample (Sec. C.5.1)

krb.realms file
        entry order (Sec. C.5.2)
        sample (Sec. C.5.2)
        wildcards (Sec. C.5.2)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

L

LDAP Module for System Authentication
        access control (Sec. D.5)

ldapcd.conf file
        parameters (Sec. C.5.5)
        sample (Sec. C.5.5)

ldapusers.deny file
        sample (Sec. C.5.6)

lock file (Sec. A.9.1)

log files (Sec. 3.1.1)
log files (Sec. 3.6)

logging tools (Sec. 3.6)

login
        audit mask, setting (Sec. 3.1.3)
        enhanced security (Sec. 1.3.2.1)
        login ID (LUID) (Sec. 3.1.4)
        maximum tries configuration (Sec. A.2.2.4)
        trusted event (Sec. 3.1.3.2)

login script
        setting user mask (Sec. 2.2.3.1)

login timouts (Sec. A.8.2)

logout trusted event (Sec. 3.1.3.2)

LUID (login ID) (Sec. 3.1.4)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

N

network
        audit hub (Sec. 3.2.1)
        auditing across a network (Sec. 3.2.1)

NIS
        automated procedures (Sec. A.6.2.2)
        large databases (Sec. A.6.2.2)
        overrides (Sec. A.6)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

O

octal numbers
        in setting permissions (Sec. 2.2.2.2)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

P

passwd file (Sec. A.9.2.5)

password
        BSD (Sec. 1.3.1)
        changing (Sec. 1.5.1)
        database (Sec. A.9.2.5)
        enhanced database (Sec. A.3.1)
        enhancements (Sec. 1.3.2.2)
        LDAP (Sec. 1.4.2)
        LDAP (Sec. D.0)
        maximum tries configuration (Sec. A.2.2.4)
        NIS (Sec. 1.4.1)

pattern matching
        changing file permissions with (Sec. 2.2.2.1.3)

permissions
        binary numbers (Sec. 2.2.2.2)
        combinations (Sec. 2.2.2.2)
        setting file and directory (Sec. 2.2.2)
        setting with octal numbers (Sec. 2.2.2.2)
        specifying with umask (Sec. 2.2.3)

physical device (Sec. A.3.5)

preselection of audit events (Sec. 3.4.6)

process audit mask (Sec. 3.1.3)

protecting removable media (Sec. A.8)

pseudoterminal (Sec. A.9.2.9)

pts/* file (Sec. A.9.2.9)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

R

rc[023] files (Sec. A.9.2.7)

recovering
        audit data (Sec. 3.3.4)

remote auditing (Sec. 3.2.1)

removing
        absolute permissions (Sec. 2.2.2.1.4)

required files (Sec. A.9.2)

resource
        ACL (Sec. 2.3)

resources
        securing (Sec. 2.0)
        securing (Sec. 2.2)
        Tru64 UNIX permissions (Sec. 2.2)

responding to audit reports (Sec. 3.8)

restricting file access (Sec. 2.2.3)

root authentication profile (Sec. A.9.2.1)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

S

/sbin/creacct command
        See creacct command

secconfig command (Sec. A.2)

secure characteristics (Sec. A.8.1)

Secure Shell
        client (Sec. B.1)
        commands (Sec. 1.4.3)
        commands (Sec. B.0)
        commands (Sec. B.7)
        configuring (Sec. B.3)
        configuring commands to use (Sec. B.4)
        configuring host-based user authentication (Sec. B.5.3)
        configuring password user authentication (Sec. B.5.1)
        configuring public key user authentication (Sec. B.5.2)
        configuring user authentication (Sec. B.5)
        creating public and private host keys (Sec. B.6.3)
        forwarding ports (Sec. B.6.4)
        forwarding TCP/IP port (Sec. B.6.4.1)
        forwarding X11 (Sec. B.6.4.2)
        managing passphrases (Sec. B.5.2.5)
        managing server (Sec. B.6)
        overview (Sec. B.2)
        resetting the daemon (Sec. B.6.1)
        restarting the daemon (Sec. B.6.1)
        restricting users (Sec. B.6.2)
        scp2 command (Sec. B.7.1.1)
        server (Sec. B.1)
        sftp2 command (Sec. B.7.1.2)
        ssh2 command (Sec. B.7.2)
        starting the daemon (Sec. B.6.1)
        stopping the daemon (Sec. B.6.1)
        user authentication (Sec. B.5)

Secure Shell client
        configuring (Sec. B.3.2)

Secure Shell server
        configuring (Sec. B.3.1)

securing
        resources (Sec. 2.0)

security policy (Sec. E.1)

segment sharing (Sec. A.2.1.2)

service key table (Sec. C.2)
        deleting a ticket (Sec. C.7.4)
        destroying (Sec. C.7.4)
        displaying (Sec. C.7.4)
        extracting entries for a host (Sec. C.7.4)
        extracting entries for a principal (Sec. C.7.4)
        merging (Sec. C.7.4)

setting
        absolute permissions (Sec. 2.2.2.1.4)
        file and directory permissions (Sec. 2.2.2)
        permissions using octal numbers (Sec. 2.2.2.2)

shared libraries (Sec. A.2.1.2)

SIA
        adding SIA mechanism (Sec. 1.5.2.2)
        changing password (Sec. 1.5.1)
        configuring (Sec. 1.5.2)
        logging (Sec. 1.5.3)
        overview (Sec. 1.5)
        removing SIA mechanism (Sec. 1.5.2.3)
        SIA mechanism initialization (Sec. 1.5.2.1)

Single Sign On
        Active Directory considerations (Sec. C.4)
        ASU considerations (Sec. C.4)
        configuration files (Sec. C.5)
        creating computer accounts (Sec. C.6.3)
        creating groups (Sec. C.6.4)
        creating user accounts (Sec. C.6.1)
        DCE considerations (Sec. C.4)
        displaying tickets (Sec. C.7.2)
        /etc/ldapcd.conf file (Sec. C.5.5)
        /etc/ldapusers.deny file (Sec. C.5.6)
        installation considerations (Sec. C.4)
        installing (Sec. C.4)
        installing on Tru64 UNIX (Sec. C.4.2)
        installing on Windows 2000 (Sec. C.4.1)
        Kerberos (Sec. C.0)
        /krb5/.k5login file (Sec. C.5.4)
        /krb5/krb.conf file (Sec. C.5.1)
        /krb5/krb.realms file (Sec. C.5.2)
        /krb5/v5srvtab file (Sec. C.5.3)
        managing (Sec. C.7)
        managing service key table (Sec. C.7.4)
        removing the credential cache (Sec. C.7.3)
        requesting tickets (Sec. C.7.1)
        setting passwords (Sec. C.6.2)
        SIA (Sec. C.4.2.3)
        upgrading (Sec. C.3)

single-user mode (Sec. A.9.2.1)

site-defined events (Sec. 3.1.3.3)

state-dependent audit events (Sec. 3.5.3)

sysman auditconfig command (Sec. 3.1.2.1)

system audit mask (Sec. 3.1.3)

system console (Sec. A.9.2.2)
system console (Sec. A.9.2.8)

system defaults database
        description (Sec. A.3.2)
        updating (Sec. A.8.2)

system startup (Sec. A.9)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

T

/tcb/files/auth/r/root file (Sec. A.9.2.1)

terminal control database (Sec. A.3.3)
terminal control database (Sec. A.5)
terminal control database (Sec. A.8.2)

ticket
        displaying with flags (Sec. C.7.2)
        requesting by lifetime (Sec. C.7.1)
        requesting by postdate (Sec. C.7.1)

traditional logging (Sec. 3.6)

troubleshooting (Sec. A.9)

Tru64 UNIX permissions
        displaying (Sec. 2.2.1)
        overview (Sec. 2.2)

trusted events (Sec. 3.1.3.2)

tty* file (Sec. A.9.2.9)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

U

umask command (Sec. 2.2.3)

update installation (Sec. A.1)

user account
        creating with creacct command (Sec. C.6.1.1)
        creating with MMC Interface (Sec. C.6.1.2)

user audit mask
        setting (Sec. 3.1.3)

user mask (Sec. 2.2.3)
        default (Sec. 2.2.3)
        login script (Sec. 2.2.3.1)
        permission combinations (Sec. 2.2.3)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

W

wildcards
        changing file permissions with (Sec. 2.2.2.1.3)

workstation
        protecting removable media (Sec. A.8)

Click letter for quick access:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

X

X displays (Sec. A.8.2)

X server
        restarting (Sec. C.4.2.1)