Tru64 UNIX Security Management


Course Code: U3697S
Length: 2 days

Schedule and Registration

Course Description

This course is designed for individuals with experience managing a Tru64 UNIX operating system and are interested in learning how to recognize and address security threats in both the base and C2 enhanced security levels of the Tru64 UNIX V5 environment.

Who Should Attend

UNIX system administrators who require experience in the advanced topics of Tru64 UNIX system security.

Prerequisites

Students should have the experience and knowledge provided by:

Students should also have 6 months experience managing a Tru64 UNIX V5 system.

Benefits of Attending this Class

Upon completion of this course, students will be able to identify Tru64 UNIX security issues and terminology and contrast base-level security with enhanced C2 security. They will be able to describe the security requirements of a given system and improve system and network security. Students will be able to perform security operations using secconfig, the account manager (dxaccounts) and the audit manager tools. They will be able to administer the audit system using auditconfig and dxaudit and perform trusted system troubleshooting and recovery operations.

Course Contents

Security Overview
  • Security Terms and Concepts
  • Threats to a Computer System
  • Basic Security Model
  • Orange Book
  • Tru64 UNIX and Security
Improving Base Level Security
  • Authentication Changes
  • Managing Accounts and Commands
  • Division of Privileges
  • Managing Accounts with CDE
  • Security Guidelines
  • Protecting Files
  • Checking Security Issues
  • TCP/IP Network Guidelines
  • Workstation Guidelines
Historical Security Holes
  • SUID and SGID Programs
  • Security Concerns
  • Security Case - Morris
Access Control Lists
  • ACL Overview
  • ACL Commands
  • ACL Decision Process
  • ACL Maintenance
  • Administering ACLs
Enhanced Security
  • Overview
  • Setting Up System Security
  • Rebooting Files after Setup
  • Authorization Contraols and Tools
  • Protected Password Database Fields
  • Using edauth
  • Lock File
  • Manual Add of Account
  • Protected Subsystems
  • Time Values
Auditing
  • Overview
  • Audit Records
  • Audit Data Recovery
  • Auditing Tools
  • Setting Up Auditing
  • Audit Events
  • Enabling Auditing
  • Object Selection and Deselection
  • Process Targeting
  • Audit Log Files
  • Audit Reports
Trusted System Troubleshooting and Recovery
  • Backup Strategy
  • Recovery
  • Recovery Procedure
  • Troubleshooting Trusted Systems
  • Ensuring System Integrity

Cookie Manager

We use cookies to enhance the features of our web site. We don't set optional cookies unless you enable them. Using this tool sets a cookie on your device to remember your preferences. For more detailed information about the cookies we use, see our Cookies page.


Necessary Cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by changing your browser settings, but this may affect how the website functions.


Preference Cookies

Preference cookies enable this site to remember information that changes the way the website behaves or looks.


Statistics Cookies

Statistic cookies help us to understand how visitors interact with the site by collecting and reporting information anonymously.


Marketing Cookies

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.


Cookies