IRIX Admin: Backup, Security, and Accounting

Prev  Next    Table of Contents:  Basic  |  Expanded


Index



absolute pathnames, reading tapes:  Reading Media from Other Systems

Access Control Lists:  Access Control Lists (ACLs)

access control violations:  File Permission Violations by Inside Users

accounting:  
    process:  System Accounting
    system:  System Accounting

acl:  Access Control Lists (ACLs)
     ls option:  Access Control Lists (ACLs)

administration, system:  
    documentation:  IRIX Admin Manual Set

archiving audit data:  Archiving Audit Data

attrinit command:  Using attrinit to Clean Up Capability Corruption

audit:  
    a file:  Auditing a File, Access to Particular Files or Resources
    a label:  Auditing a Label Under Trusted IRIX/B
    a user:  Activity by Particular Inside Users , Auditing a Specific User
    customizing:  Customizing Auditing
    data archiving:  Archiving Audit Data
    data removing:  Removing Audit Data
    event types:  Auditable Events
    guidelines:  About Proper and Improper System Management
    improper use:  About Proper and Improper System Management
    particularly interesting users:  Activity by Particular Inside Users
    sample record:  About the Audit Data
    sat_select:  Auditable Actions
    system data files modification:  Modifications of System Data Files
    system programs modification:  Modifications of System Program Attributes
    the audit trail:  Manipulation of the Audit Trail

audit data:  
    interpreting:  About the Audit Data
    understanding:  About the Audit Data

auditing:  
    cofiguration utilities:  Customizing Auditing
    customizing:  Customizing Auditing
    default environment:  Default Auditing
    enabling:  Enabling Auditing
    list of items to audit:  Auditable Events
    reading output:  About the Audit Data
    recovery:  Saving and Retrieving Your Auditing Environment
    saved files:  Placing the Audit Files
    saving:  Saving and Retrieving Your Auditing Environment

auditing, description:  Administering the System Audit Trail

auditing, satconfig utility:  About satconfig

autochangers:  Types of Backup Media

Backup:  Saving Data with Backup

backup and restore:  
    using xfsdump and xfsrestore:  About xfsdump and xfsrestore

Backup and Restore window:  System Backup Tools

backups:  
    about:  Planning a Backup Strategy
    across a network:  File Backup Across a Network
    automatic:  Automatic Backups with cron
    available programs:  IRIX Backup Tools
    byte swapping:  Reading Media from Other Systems
    dd conversion options:  Reading Media from Other Systems
    error messages:  Backup and Recovery Error Messages and Actions
    errors:  Troubleshooting Errors During Backup
    estimate space with bru:  Saving Data with Backup
    how often:  When to Back Up Data and What to Back Up
    incremental:  Incremental Backup Schedule
    incremental with cpio:  Performing Incremental Backups with cpio, Performing Incremental Backups with tar
    incremental with dump:  Performing Incremental Backups
    incremental with tar:  Performing Incremental Backups with tar, Performing Incremental Backups with cpio
    making:  General Backup Procedure
    restored wrong one:  Restoring the Correct Backup After the Wrong One
    root filesystem:  Root Filesystem Backup
    storing:  Storage of Backups
    strategies for:  Backup Strategies
    unreadable:  Troubleshooting Unreadable Backups
    user filesystems:  User Filesystem Backup

Capabilities:  Least-Privilege Capabilities

Capabilities, default:  Capabilities in This Release

capabilities, on files:  File Capabilities

chacl command:  Short ACL Text Form

changing passwords:  Controlling Password Aging by Editing /etc/passwd; Controlling Password Aging by Editing /etc/passwd

cpio:  
    about:  IRIX Backup Tools
    and System Manager:  About cpio
    capabilities:  About cpio
    making backups:  Using cpio to Back Up Files by Modification Date
    restoring files:  Restoring cpio Archives, Restoring tar Archives

cumulative restores, xfsrestore:  Performing Cumulative Restores with xfsrestore

customizing auditing:  Customizing Auditing

data segments, xfsdump:  Media Layout for xfsdump

dbedit utility:  Modifications of System Data Files

dd:  
    about:  IRIX Backup Tools
    capabilities:  About dd
    conversion options:  Reading Media from Other Systems

default backup device:  
    changing:  Changing the Default Backup Device

/dev/tape:  General Backup Procedure

disabling IP packet forwarding:  Disabling Forwarding of IP Packets

disabling NFS:  Disallowing NFS Access on the Firewall

disabling NIS:  Disabling NIS (YP) on the Firewall

DNS configuration of internal network:  Domain Name System (DNS) Security Guidelines

dual-homed host:  
    hardware setup:  Dual-Homed Host Firewall
    software setup:  Network Software Setup on a Dual-Homed Host

dump:  
    about:  IRIX Backup Tools
    /etc/dumpdates:  Backing Up a Filesystem with dump
    incremental backups:  Performing Incremental Backups
    making backups:  Backing Up a Filesystem with dump
    vs. xfsdump:  About xfsdump and xfsrestore

dump inventory, xfsdump:  Media Layout for xfsdump

dump session, xfsdump:  Media Layout for xfsdump

dump stream, xfsdump:  Media Layout for xfsdump

educating users about security:  Educating Users About the Firewall

error messages, backup and recovery:  Backup and Recovery Error Messages and Actions

/etc/capability file:  The /etc/capability File

/etc/dumpdates:  Backing Up a Filesystem with dump

/etc/hosts.equiv file:  Network Access Control Files

/etc/inetd.conf file :  Local inetd Services

/etc/passwd file :  Network Access Control Files

file audit:  Auditing a File

File Capabilities:  File Capabilities

firewall:  
     monitoring security:  Monitoring the Firewall

firewall:  
    definition:  About Firewalls
    design philosophy:  Firewall Design Philosophy
    hardware configuration:  Hardware Configuration for Firewalls
    software configuration:  IRIX Configuration for Security

firewalls:  About Network Security and Firewalls

forwarding IP packets:  Disabling Forwarding of IP Packets

FTP services:  Limiting inetd Services

hardware configuration:  
    firewall:  Hardware Configuration for Firewalls
    routers:  Routers and Firewalls

host:  
    dual-homed:  Dual-Homed Host Firewall
    screened:  Screened Host Gateway

housekeeping directory:  About the housekeeping and orphanage Directories

incremental dumps, xfsdump:  About Incremental and Resumed Dumps

inetd daemon:  Local inetd Services

inetd services:  
    limiting:  Limiting inetd Services

insider security violation:  System Use and Abuse by Inside Users

interactive restore, xfsrestore:  Performing Interactive Restores with xfsrestore

internal network configuration:  Internal Network Security Configuration

Internet, definition:  About the Internet

interrupted restores, xfsrestore:  Interrupting xfsrestore

inventory, xfsdump:  Media Layout for xfsdump; Examining xfsdump Archives

IP packet forwarding:  Disabling Forwarding of IP Packets

IRIX administration:  
    documentation:  IRIX Admin Manual Set

jukeboxes:  Types of Backup Media

label audit:  Auditing a Label Under Trusted IRIX/B

locking logins:  Controlling Password Aging by Editing /etc/passwd

log files:  About Log Files on the Firewall

login:  
    disable time:  Setting a Time Period to Disable a Line (DISABLETIME)
    locking:  Controlling Password Aging by Editing /etc/passwd, Locking Unused Logins
    maximum attempts:  Restricting Login Attempts (MAXTRYS)
    options:  System Login Options
    recording:  Recording Login Attempts
    restricting root:  Restricting root Logins
    special accounts:  About Special Accounts

ls -d option:  Using ls -D and chacl

mail:  
    configuration of internal network:  Mail Configuration Security Guidelines
    spool isolation:  Mail Spool Isolation

media:  
    layout, xfsdump:  Media Layout for xfsdump
    object, xfsdump:  Media Layout for xfsdump
    storing:  Storage of Backups

modification of system data files:  Modifications of System Data Files

modifications of system programs:  Modifications of System Program Attributes

monitoring the firewall:  Monitoring the Firewall

ncheck command:  Checking for Set-UIDs in the root Filesystem

network:  
    access control:  Network Access Control Files
    backups:  File Backup Across a Network
    screened:  Screened Host Gateway
     security issues:  Network Security Issues

NFS:  
    limiting or disabling:  Disallowing NFS Access on the Firewall

NIS:  
    disabling:  Disabling NIS (YP) on the Firewall

operating the system:  
    general:  System Accounting

orphanage directory:  About the housekeeping and orphanage Directories

outside connections:  Connections with Machines Outside the Local Network

outsider security violation:  System Use and Abuse by Outside Users

password:  
    aging:  About Password Aging
    changing:  Controlling Password Aging by Editing /etc/passwd, Controlling Password Aging by Editing /etc/passwd
    checking:  Using pwck to Check the Password File
    choosing:  Guidelines for Devising Passwords
    dialup:  Establishing Second (Dialup) Passwords
    forcing:  Forcing a Password
    PROM:  About PROM Passwords
    protection:  Password Protection on the Firewall

password PROM:  About PROM Passwords

passwords:  
    administration:  Password Administration

potential security violations:  About Security Violations

process accounting:  System Accounting

PROM passwords:  
    clearing:  Clearing the PROM Password Using nvram
    setting:  Setting the PROM Password from the Command Monitor
    use of:  About PROM Passwords

proxy servers:  About Proxy Servers

pwck command:  Using pwck to Check the Password File

Recover System:  Recovering Data After System Corruption

recovery:  
    after system corruption:  Recovering Data After System Corruption
    error messages:  Backup and Recovery Error Messages and Actions

removing:  
    audit data:  Removing Audit Data

Restore:  
    about:  IRIX Backup Tools, IRIX Backup Tools
    interactive mode:  Recovering Individual Files with restore
    restoring data:  Restoring Data with Restore
    restoring filesystems:  Recovering a Filesystem with restore
    restoring individual files:  Recovering Individual Files with restore
    vs. xfsrestore:  About xfsdump and xfsrestore

restoring data:  
    cpio:  Restoring tar Archives, Restoring cpio Archives
    restore:  Recovering a Filesystem with restore , Restoring Data with Restore
    tar:  Restoring tar Archives, Restoring cpio Archives

restoring interrupted dumps, xfsrestore:  Performing Cumulative Restores with xfsrestore

.rhosts file :  Network Access Control Files

robotic media changers:  Types of Backup Media

root privilege violation:  Unexpected Use of Root Privilege by Inside Users

routers and firewalls:  Routers and Firewalls

RPC services:  
    limiting:  Limiting rpc Services Access on the Firewall

SAT:  
    customizing:  Customizing Auditing
    event types:  Auditable Events
    sample record:  About the Audit Data
    sat_select:  Auditable Actions
    understanding data:  About the Audit Data

sat_interpret utility:  About the Audit Data; About the Audit Data

sat_reduce utility:  About the Audit Data

sat_select:  Auditable Actions

sat_select utility:  About sat_select

sat_summarize utility:  About the Audit Data; About the Audit Data

satconfig utility:  About satconfig

screened host:  
    hardware setup:  Screened Host Gateway

screened network:  
    hardware setup:  Screened Host Gateway

security:  
    guidelines:  Security Safeguards and Cautions
    IRIX standard:  Standard Security Features
    LAN:  Local Area Network Access
    network:  Network Security
    process accounting:  System Accounting
    tightening for firewall:  Tightening Security in IRIX
    Trojan horse attack:  Security Safeguards and Cautions
    xhost command:  Limiting Access with the xhost Command

security violation:  
    insider:  System Use and Abuse by Inside Users

security violation (auditing):  
    access control:  File Permission Violations by Inside Users
    outside connections:  Connections with Machines Outside the Local Network
    outsider:  System Use and Abuse by Outside Users
    potential:  About Security Violations
    root privilege:  Unexpected Use of Root Privilege by Inside Users
    unauthorized entry:  Attempts at Unauthorized System Entry
    unusual system usage:  System Use at Unusual Hours or from Unusual Locations

sendmail:  
    configuration:  Sendmail Configuration and Mail Aliases

Set-GID:  Checking for Set-UIDs in the root Filesystem

Set-UID:  Checking for Set-UIDs in the root Filesystem

software:  
     checking integrity:  Checking Software Integrity on the Firewall

stream terminator, xfsdump:  Media Layout for xfsdump

system access:  Controlling Password Aging by Editing /etc/passwd; Controlling Password Aging by Editing /etc/passwd; Controlling Password Aging by Editing /etc/passwd

system accounting:  System Accounting;  System Accounting

system administration:  
    documentation:  IRIX Admin Manual Set

system backups:  System Backup Tools

system data files:  
    modification:  Modifications of System Data Files

System Maintenance Menu:  Recovering Data After System Corruption

system passwords:  
    password:  
        system:  About PROM Passwords

system recovery:  Recovering Data After System Corruption

tape device, default:  General Backup Procedure

tapes:  
    reusing:  Guidelines for Tape Reuse
    storing:  Storage of Backups
    testing:  Testing for Bad Media

tapes, absolute pathnames:  Reading Media from Other Systems

tapes, reusing with xfsdump:  Reusing Tapes with xfsdump

tar:  
    about:  IRIX Backup Tools
    capabilities:  About tar
    comparison key characters:  Examining tar Archives
    making backups:  Using tar to Back Up Files by Modification Date
    restoring files:  Restoring tar Archives, Restoring cpio Archives

terminator, xfsdump:  Media Layout for xfsdump

Trojan horse attack:  Security Safeguards and Cautions

unauthorized entry:  Attempts at Unauthorized System Entry

understanding the audit data:  About the Audit Data

unusual system usage:  System Use at Unusual Hours or from Unusual Locations

user accounts:  
    forcing a password:  Forcing a Password

user audit:  Auditing a Specific User

users and security:  Educating Users About the Firewall

violations:  
    of access control security:  File Permission Violations by Inside Users
    of root privilege security:  Unexpected Use of Root Privilege by Inside Users
    of security by insiders:  System Use and Abuse by Inside Users
    of security by outsiders:  System Use and Abuse by Outside Users
    of security by unauthorized entry:  Attempts at Unauthorized System Entry
    of security by unusual system usage:  System Use at Unusual Hours or from Unusual Locations
    possible:  About Security Violations
    through outside connections:  Connections with Machines Outside the Local Network

World Wide Web:and security:  World Wide Web Security Issues

X server access:  
    checking:  Interactive Use of the xhost Command
    controlling:  X11 Network Access

xfsdump:  
    dump inventory:  Examining xfsdump Archives
    incremental dumps:  About Incremental and Resumed Dumps
    media layout:  Media Layout for xfsdump
    network usage:  Using xfsdump and xfsrestore to Copy Filesystems
    resumed dumps:  About Incremental and Resumed Dumps
    reusing media:  Reusing Tapes with xfsdump
    specifying media:  Specifying Local Media with xfsdump
    STDOUT:  Using xfsdump and xfsrestore to Copy Filesystems
    using:  Saving Data with xfsdump

xfsrestore:  
    cumulative restores:  Performing Cumulative Restores with xfsrestore
    interactive restore:  Performing Interactive Restores with xfsrestore
    interrupted restores:  Interrupting xfsrestore
    network usage:  Performing Network Restores with xfsrestore, Using xfsdump and xfsrestore to Copy Filesystems
    restoring files:  Restoring Individual Files with xfsrestore
    restoring interrupted dumps:  Performing Cumulative Restores with xfsrestore
    session ID:  Performing Simple Restores with xfsrestore
    session label:  Performing Simple Restores with xfsrestore
    simple restores:  Performing Simple Restores with xfsrestore
    STDIN:  Using xfsdump and xfsrestore to Copy Filesystems
    using:  About xfsrestore

xhost command:  Limiting Access with the xhost Command
IRIX Admin: Backup, Security, and Accounting

Prev  Next    Table of Contents:  Basic  |  Expanded