home *** CD-ROM | disk | FTP | other *** search
-
-
- Table of Contents
-
- Chapter 1 PROTEC NET OVERVIEW
- USERS, GROUPS AND GROUP ACCESS PERMISSIONS
- SECURITY SERVERS AND PASSWORD MANAGEMENT
- HOW SECURITY WORKS
- WORKSTATION SECURITY FLOW CHART
-
- Chapter 2 NETWORK SECURITY INSTALLATION
- SERVER INSTALLATION
- NOVELL NETWARE BINDERY CHANGES
- ACCESSING THE SECURITY PROGRAM
- WORKSTATION AUTO INSTALLATION
- VIEW AUTO INSTALLATION RESULTS
- WORKSTATION SYSTEM CHANGES
- CONFIG.SYS AND AUTOEXEC.BAT
- PROFLAGS ENVIRONMENT VARIABLE
- EXAMPLES
- DIRECTORIES CREATED DURING WORKSTATION INSTALLATION
- THE PROTEC DIRECTORY
- THE DRIVERS DIRECTORY
- THE PUBLIC DIRECTORY
- PROTEC NET WORKSTATION LOGIN
- SUPERVISOR LOGIN FUNCTION
- MAINTAINING A SECURE SYSTEM
- INCREASING YOUR SITE LICENCE
-
- Chapter 3 WORKSTATION SECURITY
- ACCESSING WORKSTATION SECURITY FEATURES
- ADD OR DELETE WORKSTATION ID
- INSTALL OR REMOVE PROTEC
- INSTALL OR REMOVE BOOT PROTECTION
- EMERGENCY REMOVAL
- BUILD DIRECTORY TREES
- AUTOEXEC AND CONFIG PROTECTION
- KEYBOARD LOCK
- WINDOWS KEYBOARD LOCK
- SYSTEM LOCKOUT
- SAVE SCREEN
- SYSTEM VERIFICATION CHECK
- LOGIN SHELL
- DISPLAY VIOLATIONS
- MEMORY BUFFERS
- WHEN SERVER IS DOWN / LAPTOPS
-
- Chapter 4 AUDITS
- EVENTS
- DELETE AUDIT RECORDS
- AUDIT DATABASE STRUCTURE
-
-
- Chapter 5 USER SECURITY
- GROUP MENU AND OBJECT REUSE
- GROUP ACCESS PERMISSIONS
- PERMISSION AND CODES
- DIRECTORY TREES
- SETTING PERMISSIONS
- HOW PERMISSIONS ARE EVALUATED
- EXAMPLE
- PRINTER AND COMM PORTS PERMISSIONS
- SYSTEM CLOCK ACCESS CONTROL
- SUBMENU ACCESS CONTROL
- USER LOGIN SHELL
- ASSIGNING EACH USER A PRIMARY SERVER
- MASTER PASSWORD
-
- Chapter 6 ENCRYPTION
- AUTOMATIC FILE ENCRYPTION
- ENCRYPTION KEY
- ENCRYPTION METHOD
- COMMAND LINE - MANUAL ENCRYPTION
- ENCRYPTION AND BACKUP PROGRAMS
-
- Chapter 7 LOGIN SCRIPTS
- PROTEC LOGIN PROGRAMS
- SYSTEM LOGIN SCRIPT
- PASSWORD MANAGEMENT
- LOGIN SCRIPT COMMANDS
-
- Chapter 8 PROTEC NET PROGRAMS
-
- Chapter 9 OPTIMIZING THE SYSTEM
- MINIMIZE MEMORY USAGE
- DEACTIVATE UNUSED WORKSTATION SECURITY FEATURES
- REDUCE PROTEC MEMORY BUFFER SIZE
- DEACTIVATE UNUSED AUDIT EVENTS
- LOADING PROTEC NET INTO HIGH MEMORY
- MAXIMIZE PERFORMANCE
- MINIMIZE DISK SPACE USAGE
-
-