home *** CD-ROM | disk | FTP | other *** search
/ PC Direct 1995 May / PC Direct CD-ROM (May 1995).ISO / ipe / manuals / protnet / toc.txt < prev    next >
Encoding:
Text File  |  1994-08-09  |  4.9 KB  |  93 lines

  1.  
  2.  
  3. Table of Contents
  4.  
  5. Chapter 1  PROTEC NET OVERVIEW                                       
  6.         USERS, GROUPS AND GROUP ACCESS PERMISSIONS                
  7.         SECURITY SERVERS AND PASSWORD MANAGEMENT                  
  8.         HOW SECURITY WORKS                                        
  9.         WORKSTATION SECURITY FLOW CHART                           
  10.  
  11. Chapter 2  NETWORK SECURITY INSTALLATION                             
  12.         SERVER INSTALLATION                                       
  13.                 NOVELL NETWARE BINDERY CHANGES                           
  14.         ACCESSING THE SECURITY PROGRAM             
  15.         WORKSTATION AUTO INSTALLATION              
  16.         VIEW AUTO INSTALLATION RESULTS             
  17.         WORKSTATION SYSTEM CHANGES                        
  18.                 CONFIG.SYS AND AUTOEXEC.BAT                      
  19.                 PROFLAGS ENVIRONMENT VARIABLE                    
  20.                 EXAMPLES                                        
  21.                 DIRECTORIES CREATED DURING WORKSTATION INSTALLATION
  22.                 THE PROTEC DIRECTORY                            
  23.                 THE DRIVERS DIRECTORY                           
  24.                 THE PUBLIC DIRECTORY                            
  25.         PROTEC NET WORKSTATION LOGIN                      
  26.         SUPERVISOR LOGIN FUNCTION                        
  27.         MAINTAINING A SECURE SYSTEM                       
  28.         INCREASING YOUR SITE LICENCE                      
  29.  
  30. Chapter 3  WORKSTATION SECURITY                              
  31.         ACCESSING WORKSTATION SECURITY FEATURES             
  32.         ADD OR DELETE WORKSTATION ID                        
  33.         INSTALL OR REMOVE PROTEC                            
  34.         INSTALL OR REMOVE BOOT PROTECTION                   
  35.                 EMERGENCY REMOVAL                                 
  36.         BUILD DIRECTORY TREES                              
  37.         AUTOEXEC AND CONFIG PROTECTION                     
  38.         KEYBOARD LOCK                                      
  39.         WINDOWS KEYBOARD LOCK                            
  40.         SYSTEM LOCKOUT                                    
  41.         SAVE SCREEN                                       
  42.         SYSTEM VERIFICATION CHECK                         
  43.         LOGIN SHELL                                       
  44.         DISPLAY VIOLATIONS                                
  45.         MEMORY BUFFERS                                    
  46.         WHEN SERVER IS DOWN / LAPTOPS                     
  47.  
  48. Chapter 4  AUDITS                                            
  49.         EVENTS                                            
  50.         DELETE AUDIT RECORDS                              
  51.         AUDIT DATABASE STRUCTURE                          
  52.  
  53.  
  54. Chapter 5 USER SECURITY                                     
  55.         GROUP MENU AND OBJECT REUSE                       
  56.         GROUP ACCESS PERMISSIONS                          
  57.                 PERMISSION AND CODES                             
  58.                 DIRECTORY TREES                                  
  59.                 SETTING PERMISSIONS                              
  60.                 HOW PERMISSIONS ARE EVALUATED                    
  61.                 EXAMPLE                                         
  62.                 PRINTER AND COMM PORTS PERMISSIONS               
  63.                 SYSTEM CLOCK ACCESS CONTROL                      
  64.                 SUBMENU ACCESS CONTROL                           
  65.         USER LOGIN SHELL                                  
  66.         ASSIGNING EACH USER A PRIMARY SERVER              
  67.         MASTER PASSWORD                                   
  68.  
  69. Chapter 6  ENCRYPTION                                        
  70.         AUTOMATIC FILE ENCRYPTION                         
  71.                 ENCRYPTION KEY                                  
  72.                 ENCRYPTION METHOD                               
  73.         COMMAND LINE - MANUAL ENCRYPTION                  
  74.         ENCRYPTION AND BACKUP PROGRAMS                      
  75.  
  76. Chapter 7  LOGIN SCRIPTS                                       
  77.         PROTEC LOGIN PROGRAMS                               
  78.         SYSTEM LOGIN SCRIPT                                 
  79.         PASSWORD MANAGEMENT                                 
  80.         LOGIN SCRIPT COMMANDS                             
  81.  
  82. Chapter 8  PROTEC NET PROGRAMS                                
  83.         
  84. Chapter 9  OPTIMIZING THE SYSTEM                              
  85.         MINIMIZE MEMORY USAGE                              
  86.         DEACTIVATE UNUSED WORKSTATION SECURITY FEATURES   
  87.                 REDUCE PROTEC MEMORY BUFFER SIZE                  
  88.                 DEACTIVATE UNUSED AUDIT EVENTS                    
  89.                 LOADING PROTEC NET INTO HIGH MEMORY               
  90.         MAXIMIZE PERFORMANCE                               
  91.         MINIMIZE DISK SPACE USAGE                          
  92.                                                    
  93.