Home
Anti-Virus GUI 3.5.0 User Manual.book - Raz
Contents
1. 2 2 2 2 255 255 255 255 Yes No No Yes Editor display Print format Right click on a records or several records to print in the following printing formats Print to a printer W Select Fit Width to print the entire record on a single page Select Export to export records to five different formats Excel Open Source Spreadsheet HTML PDF and CSV iSecurity GUI User Manual 55 Editors 3usiness Item 01 Show All Open Ctrl C Cell Deom 4 Application v Fi Width amp Print Excell 2003 XML format Open Document Format Spreadsheet Hypertext Markup Language HTML Portable Document Format PDF Comma Separated Values CSV Print Formats Open editor display Open editors have special rendering in the Navigator View and appears in Italics iSecurity GUI User Manual 56 Editors s Security Navigator n E 4 gt Business Intelligence b gt Capture b amp Central Administration gt gt Compliance Evaluator v amp Firewall Unsaved state Configuration Global IP Filtering Open editors C Incoming IP Addresses Incoming Remote System Names E Outgoing IP Addresses Intrusion Detection Qa Visited editor P Logon gt Objects E Port Restrictions P Rule Wizards Server Settings Time groups b Users and Groups b Logs P Maintenance Op
2. About iSecurity Check for Updates 2 The GUI will automatically connect to the update site and perform the update 5 Contacting Software Sites 1 Contacting http www razlee info gui updates4 Always run in background Run in Background Details gt gt Contacting Software Site Automatic and Scheduled Updates 1 To set automatic updates go to Window gt Preferences gt Install Update 2 Check the Automatically find new updates and notify me check box and set definitions iSecurity GUI User Manual 42 Update Preferences type filter t Automatic Updates telp nstall Update Automatically find new updates and notify me Automatic Updates Update schedule Available Software Sites Look for updates each time platform is started SL Settings Look for updates on the following schedule security Download options 8 Search for updates and notify me when they are available Download new updates automatically and notify me when ready to When updates are found Notify me once about updates Remind me about updates every 30 minutes Restore Defaults ans Automatic Updates iSecurity Archived Update Site If you don t have internet connection from the GUI you can updated the application using a local update site 1 2 3 iSecurity GUI User Manual Ask for the new update zip file from your distributor and save it on
3. Message Queue Screening of allowed activity Revert Hsave Editor Tool Bar Every form has Save Revert actions iSecurity GUI User Manual 51 Editors E Intrusion Detection 2 Detected Intrusion End the offending interactive session Send message to the user O Disable user Prevent specific users from being disabled automatically 0 Send email to Security Administrator Email TZION RAZLEE COM Run Action If Action is installed O Write to QAUDJRN security audit journal Audit journal code is U Journal entry type is FW Data format SMZ8 GSCALP Message Queue Screening of allowed activity 4 Revert Save Revert Save Editor s actions are available also via a pop up Intrusion Detectior s amp Detected Intrusion Save End the offending inte lt Revert Send message to the gt Refresh F5 Disable user Properties Alt Enter Prevent specific users from bei isabled automatically Send email to Security Administrator iSecurity GUI User Manual 52 Editors Error messages as link 5720 15 T Firewall Global IP Filtering Incoming IP Addresses iSecurity Edit Window Help 1 coming IP Addresses 8 cs o iSecurity 1 Firewall Global IP Filtering Incoming IP Addresses Firewall FULL
4. 29 Restore the Navigator c 31 Application PASSWONG 32 Screens and Editors E 33 p E M E E E 34 Nodes T 35 Updated new features and version 36 iSecurity Archived Update tr pr tote ope eter spe pes UU tineis Exon 39 Reporting problems in iSecurity GUI 39 Log Preferences WINdOW AF 39 deh S 41 Last Modified Editor 43 Editor 44 Open editor display N 45 Editor Filter 46 R le Wizards 48 Preferences MEE ME MEM M 50 Chapter 3 Anti VIFUS 54 m T 54 WOTTON 54 Appendix License Agreement ii Preamble s ii GNU LESSER GENERAL PUBLIC LICENSE bene iii Introducing iSecurity 1 What is iSecurity Chapter 1 Introducing iSecurity What is iSecurity Why You Need iSecurity How iSecurity Works iSecurity GUI User Manual iSecu
5. A list of editors appears in alphabetic order tz Development Editors Actions Activation Activation Activation Application Groups Audit Audit Log Audit Queries Audit Scheduler Show As List Group By Types Group By Tags Cancel Editors List If Group By Tags is checked you can quickly activate selected editors This works also for multiple accounts sessions iSecurity GUI User Manual 37 Nodes with filter iSecurity 1 Editors x Enter tag prefix or pattern or camel case amp Activation Activation Screen Activation gt Collected data 7 Show As List Group By Types Group By Tags Path AMIR iSecurity 1 Anti Virus Activation Editors List by Tags Nodes with The following example use the Profiles node under User Management filter To filter information right click the node the properties dialog for Profiles displays select Filter NOTE Changes done here will take place at the next attempt to open the editor or at the next attempt to refresh an already opened one iSecurity GUI User Manual 38 Nodes with filter Properties for Profiles Properties Filter The filter is accessible also via editor s pop up iSecurity GUI User Manual 39 Nodes with filter Show entry content Right click on any table record and select Show Content to view the table
6. 9 Anew master password has been created Password recovery can be P enabled by providing additional information Would you like to do so now Secure Storage Linux users create a Master Password dialog box will be prompt 4 Thenexttime the iSecurity GUI will start the SSL Settings dialog box will prompt asking for the secured file name and access password Secure Storage The secure storage is located at Window gt Preferences gt Security gt Stor age and saves data in an encrypted form On some operating systems it uses your operating system account information to provide a single sign on experience The secure storage itself does not contain encryption code It uses algorithms supplied by the Java virtual machine and or the operating system The secure storage also contains the Windows account information in an encrypted form which means that without the Windows account password there is no access to the Power i sensitive data The information in the secure storage is encrypted in the strongest way that even if the encrypted information file is stolen there is no way to crack it NOTE Read more about Secure Storage in iSecurity Help Delete Secure Storage Delete the Secure Storage information follow this procedure 1 From the toolbar go to Window gt Preferences Security gt Stor age 2 Select the Contents tab iSecurity GUI User Manual 17 Account Information Properties 3
7. Best Fit Algorithm 22 1 1 5 FYI Sim laion Mod recu peto pH Sopra do QS S oH INE DH bU br D plv M PERDE E 6 Override T 6 R le Wizards 6 Prunus qe Q 6 Business Intelligence Visualizer i reete tbi pe PE Ue te 6 aee 7 7 7 PSI MO P C 7 FN CUM 7 PW SR M 8 bi CT 8 Capture 8 DEREN RR ON IR RR RE Stc Rec 8 crunt 8 PW as oque rope cp ET DEN 8 Chapter 2 Getting Started 4 10 Create New 22444000 10 Running iSecurity GUI in SSL mode one reete etr pt tee inse 12 Account Information Properties 16 Connection TMIGOUL rr EE E ESES 18 Jtem e Tc 19 Deleting Account 21 SGSSIONG 22 Creating New Session 23 Disconnecting SESSION E oaan 26 27 28 SS
8. GNU LESSER GENERAL PUBLIC LICENSE GUI User Manual data prepared so as to be conveniently linked with application programs which use some of those functions and data to form executables The Library below refers to any such soft ware library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it For a library complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running a program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does 1 You may copy and distribute verbatim copies o
9. Click to select the Default Secure Storage Preferences ty General Help Install Update SSL Settings Security Secure Storage Secure Storage Password Contents Advanced a Default Secure Storat org eciipse equinox Values associated with the selected node 10 Value javax net ssl keyStore javax net ssl keyStorePassword iSecuri javax net ssl trustStore javax net ssl trustStorePassword R Storage location C Documents and Settings Owner eclipse org eclipse equinox security secure_storage Restore Defaults Apply Secure Storage 4 Click Delete to clean the storage Account Once an account is created it is added to iSecurity navigator Information An account can be modified by right clicking on it and selecting Properties Properties iSecurity GUI User Manual 18 Account Information Properties iSecurity Properties Alt Enter Account Properties iSecurity GUI User Manual 19 Account Information Properties Properties for S720 Account Properties Item Display node authorization and tag it for easier search of the specific item in the GUI appli cation iSecurity GUI User Manual 20 Account Information Properties Properties for Activation Properties Item Add a new tag or assign an existing one iSecurity GUI User Manual 21 Deleting an Accoun
10. coming IP Addresses amp amp gt IPAddress Browse IP Address Subnet Mask FTP REXC Telnet DB TCPSGN RMT DDM Text Error messages as link Clicking the link to display error message Last Modified Editor Last Modified Editor will activate the last form that has changed iSecurity GUI User Manual 53 Editors 8720 isecurity T Eirewall Intrusion Detection Ele Edit Window Help n a tS Security E Intrusion Detection iSecurity 5 S720 iSecurity 1yFirewall Intrusion Detection Firewall FULL EJ Intrusion Detection amp e amp Detected Intrusion m Message Queue Screening of allowed activity Message queue name NONE Re ert Save ne Writable Last Modified Editor Editor Display Editor displays product name authorization information and idle time iSecurity GUI User Manual 54 Editors Incoming IP Addresses i 720 iSecurity 1 Firewall Global Filtering Incoming IP Addresses Firewall FULL E Incoming IP Addresses 3 B Browse IP Address Subnet Mask FTP REXC Telnet DB TCPSGN RMT DDM Text ALL 0 0 0 0 Yes No No No FALL 1 1 1 144 255 255 255 255 Yes No No Yes Yes 1 1 1 166 255 255 255 255 Yes Yes Yes Yes Yes Yes 1 9 5 8 255 255 255 0 No No No Yes SSL Only 227 2 255 255 255 240
11. Design System i security is based on five basic levels Server Exit Point Security TCP IP Address Firewall Security User to Service Security Object Security Logon Security provides additional security features once access has been granted Simply put whenever a higher less specific rule will suffice you do not need any more spe cific rules For example if you do not need to use FTP you simply reject all transactions at the FTP Server Exit Point level You do not need to define any rules that limit FTP access via specific IP addresses by specific users or to specific objects iSecurity Rules and the Best Fit Algorithm iSecurity is a rules based security product You create a wide variety of rules to cover many different situations and to counter different kinds of threats Some rules will likely apply globally to all or most activity types while others will be designed to cover very spe cific situations iSecurity GUI User Manual How iSecurity Works You can enable FYI Simulation mode globally for all activity regardless of server or user You can also enable FYI individually for specific function servers as a parameter in server security rules In this manner you can test security rules for specific servers without affect ing rules that apply to other servers FYI Simulation Mode FYI Simulation mode allows you to simulate the application of security rules without phys ically rejecting any activity All rejecte
12. General Public License This license the GNU Lesser General Public License applies to certain designated libraries and is quite different from the ordinary Gen eral Public License We use this license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a library whether statically or using a shared library the combination of the two is legally speaking a combined work a derivative of the original library The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom The Lesser General Public License permits more lax criteria for linking other code with the library We call this license the Lesser General Public License because it does Less to protect the user s freedom than the ordinary General Public License It also provides other free software developers Less of an advan tage over competing non free programs These disadvantages are the reason we use the ordinary General Public License for many libraries However the Lesser license provides advantages in certain special circumstances For example on rare occasions there may be a special need to encourage the widest possi ble use of a certain library so that it becomes a de facto standard To achieve this non free programs must be allowed to use the library A more frequent case is that a free library does the same job as widely used non free libraries In
13. User Manual 61 Preferences January Sun Mon February March 4 5 6 11 22 13 May 18 19 20 25 26 Wu July August September October November December Select Date Box Click the month or year to browse it Mail To Define a default E mail address to be used in queries compliance and scheduler Go to Window Preferences iSecurity gt Mail To iSecurity GUI User Manual 62 Preferences ios Preferences Mail To General Help A default list of email addresses used in commands Content that send output via email Install Update Mail to support razlee com mail1 mail2 mail3 Automatic Updates Available Software Sites SSL Settings Security Secure Storage iSecurity Console Export to CSV Locale Log Mail To Default E mail Address iSecurity GUI User Manual 63 Preferences iSecurity GUI User Manual 64 Anti Virus 3 Activation Chapter 3 Anti Virus Activation Currently the GUI version of Anti Virus enables activating the real time detection only This feature enables Anti Virus to get up and running and start examining all incoming files folders and IFS objects To activate real time detection click Apply at Activate Anti Virus to start Anti Virus Activation 22 Development iSecurity 1 Anti Virus Activation Antivirus FULL E Activation Real Time Detection is
14. con tained in Action Action Action automatically intercepts and responds to security breaches system activity events QHST contents and other message queues Inquiring messages can be automatically answered Alerts are sent by e mail SMS pagers or the message queues Command scripts with replacement variables perform customized corrective actions such as terminating a user session or disabling a user profile iSecurity Anti Virus Anti Virus provides solid virus protection that prevents your System i from becoming an infection source Anti Virus automatically scans and examines all incoming IFS files vali dating and checking them as they are enrolled or modified Anti Virus authenticates them and finally quarantines or erases infected files view View is a unique patent pending field level solution that hides sensitive fields and records from restricted users This innovative solution hides credit card numbers customer names etc Restricted users see asterisks or zeros instead of real values View requires no change in existing applications It works for both SQL and traditional I O Capture Capture silently captures and documents user screens for tracking and monitoring without any effects on system performance It also preserves job logs for subsequent review capture can run in playback mode and can be used to search within texts Screen Screen protects unattended terminals and PC workstations from u
15. headers of the entry This view will be the default view if the table has no Open button 57 i elopment iSecurity 1 Journal Appication Outputs Journal FULL 1 min idle Application Outputs Name Name Invert Selection h Business Item 01 Show Selected th Business Item 01 02 cA th Business Item 01 and 02 Show Content Open DEMOP 10 Fit Width print emo with Business Item 01 and 02 plete created in as400 4 check Export Show Entry Content iSecurity GUI User Manual 40 Update Show Content Show content of selected row busine found DEMO2 Library SMZJDTA Description Demo with B sin amp ss Item 01 Wrap text Show Content of Selected Row Use the navigation buttons at the right to navigate the entries Use the search bar at the top of the dialog box The search string will be high lighted Update Check for updates in one click Updates and new releases are available through the GUI itself 1 Goto Help gt Check for Updates iSecurity GUI User Manual 41 Update los isecurity Edit Window EiS lt 2 Help Contents ES os iSecurity 8 Search FA 5 iSecurity Navigato Check for Updates iSecurity Instal New Software iSecurity 1 gt Audit
16. iSecurity 1 Nov 29 2 2002 f New Account Disconnect Session Session Properties Session properties are read only information the connection can not be modified iSecurity GUI User Manual 28 Creating New Session Properties for iSecurity 1 Session Properties Connection Item Display node authorization and tag it for easier search of the specific item in the GUI appli cation Add a new tag or assign an existing one iSecurity GUI User Manual 29 Creating a New Session Properties for Activation Session Session lists product s authorization level iSecurity GUI User Manual 30 Creating New Session Properties for iSecurity 1 type filter text Session Connection Item Started at Nov 29 2009 4 11 54 AM Session General Jobs Products Authorization Admin FULL Antivirus FULL Audit FULL Authority on demand FULL Capture FULL Firewall FULL Journal Not Authorized Password USE Replication FULL Screen FULL User Management FULL View Not Authorized Visualizer for Audit FULL Visualizer for Fierwall FULL Session Properties Session The Jobs tab lists session jobs iSecurity GUI User Manual 31 Navigator Navigator Properties for iSecurity 1 type filter text Connection Item Number User Service 561133 QZD
17. not available on this server requires V5R3 and higher Activation Activate Anti Virus Apply Deactivate Anti Virus Appl Monitor jobs Work with active monitor jobs Open Activation Monitor Jobs Click Open to display active jobs iSecurity GUI User Manual 66 Monitor Jobs iSecurity GUI User Manual Work with Subsystem Jobs Subsystem Type options press Enter 2 Change 3 Hold 4 End 5 8 Hork with spooled files 13 01 Opt Job User RNTIVIRU81 SECURITYSP AVEMAIL SECURITYSP RVHONITOR SECURITYSP QPOZSPHP SECURITYSP BATCHI 0 0275 SECURITYSP BATCHI QZSHSH SECURITYSP BATCHI Parameters or command ZRNTIVIRU k uith sconnect RCTIVE RCTIVE RCTIVE RCTIVE RCTIVE RCTIVE 5 6 Rel ease 7 Display message Function PGM AVCLCT CND QSH DLY 30 PGM QZSHCHLD PGH DRTRQ PGM QZSHSH Bottom F3 Exit F4zPrompt F5 Refresh F12 Cancel F17 Top F18 Bottom F9 Ret rieve Fili Displau schedule data Active Monitor Jobs 67 Monitor Jobs iSecurity GUI User Manual 68 License Agreement a Preamble Appendix License Agreement Preamble GUI User Manual GNU LESSER GENERAL PUBLIC LICENSE Version 2 1 February 1999 Copyright C 1991 1999 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed The licenses for most
18. or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a conse quence of the rest of this License 12 If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License which applies to it and any viii GNU LESSER GENERAL PUBLIC LICENSE 14 15 GUI User Manual later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation
19. this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public License In other cases permission to use a particular library in non free programs enables a greater number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library The precise terms and conditions for copying distribution and modification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICA TION This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License also called this License Each lic ensee is addressed as you A library means a collection of software functions and or
20. ASOINIT QUSER Database 561138 QZRCSRVS QUSER Command Session Properties Jobs Navigate between the open editors screens according the order they were opened by Development iSecurity 1 Queries and Reports Edit BEGGE Window Help lt Backward History Alt Left c Forward History Alt Right iSecurity GUI User Manual 32 Window Navigate Navigation can also be done by using the keyboard short cuts or the arrows a Development iSecurity 1 Queries and Edit Navigate Window Help 25 iSecurity Navigator CHEER E Audit AS at Data Developm T Audit Settings Pace 5 Dat 2 Port Restrictions 9 2 Rule Wizards E Window Show View Display the GUI application possible views Go to Window gt Show View and select a view to display in the interface layout iSecurity VE Help 0 Reset Window El Console Progress Preferences E Properties Ly iSecurity 2 iSecurity 1 8 2010 2 13 1 Show View Reset Window The GUI layout can easily restore it s state after it s being disposed by using the Reset Window recovery button in the toolbar iSecurity GUI User Manual 33 Window Edit Window jm Reset Window Restore GUI Layout Console Console view display the log in real time when you need to r
21. Anti Virus GUI The Network Security Component of iSecurity iSecurity GUI 4 User Manual RAZ LEE urity Experts Updated 11 14 2011 Copyright Notice Copyright Raz Lee Security Inc rights reserved This document is provided by Raz Lee Security for information purposes only Raz Lee Security is a registered trademark of Raz Lee Security Inc Action System Con trol User Management Assessment Firewall FileScope Screen Password Audit Cap ture View Visualizer Anti Virus AP Journal are trademarks of Raz Lee Security Inc Other brand and product names are trademarks or registered trademarks of the respective holders Microsoft Windows is a registered trademark of the Microsoft Corporation Adobe Acrobat is a registered trademark of Adobe Systems Incorporated Information in this document is subject to change without any prior notice The software described in this document is provided under Raz Lee s license agreement This document may be used only in accordance with the terms of the license agreement The software may be used only with accordance with the license agreement purchased by the user No part of this document may be reproduced or retransmitted in any form or by any means whether electronically or mechanically including but not limited to photocopying recording or information recording and retrieval systems without written permission given by Raz Lee Security Inc Visit our web site at www
22. From the command prompt from within the iSecurity installation location issue this command isecurity exe vmargs Djavax net ssl trust Store trustlist Djavax net ssl trustStorePassword pwd Replace trustlist and password with your own these are the parameters used in step 3 The trustlist parameter is the absolute path to the file itself including file name c trus tlist but if this file resides on iSecurity installation location there is no need to type the path iSecurity GUI User Manual 15 Running iSecurity GUI SSL mode SSL Settings 1 From the menu bar select Window Preferences SSL Settings ios Preferences SSL Settings General Help a Install Update File FileName SSL Settings Security i iSecurity Prompt on startup Note these settings will take effect at the next application start Trust Store Password Restore Defaults Preferences SSL Settings 2 keep the SSL connection in high security level check the Prompt on Startup check box and leave the File and Password fields empty If you don t want the prompt type the file name and access password and leave the check box empty 3 Click Apply or OK These settings take affect only once at application start Windows users a Master Password will automatically be created according to the Windows logon user password in use iSecurity GUI User Manual 16 Security Security Secure Storage
23. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promotin g the sharing and reuse of software generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED
24. TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS GNU LESSER GENERAL PUBLIC LICENSE GUI User Manual X
25. d transactions are recorded in the Activity log as such but the activity is allowed to proceed without interruption This feature allows you to test your rules under actual working conditions without adversely affecting user success FYI Simulation mode may be enabled globally for all activity or enabled for individual function servers In this manner you can test security rules for specific servers without affecting rules that apply to other servers Emergency Override The Emergency Override feature allows you to override all existing security rules tempo rarily by allowing or rejecting all activity feature is useful in order to respond quickly to emergencies such as critical transactions being rejected due to problems with iSecurity security rules or a sudden security breach Rule Wizards The unique Rule Wizards feature makes security rule definition a snap even for non techni cal system administrators This user friendly feature allows you to view historical activity together with the security rule currently in effect on a single screen You can even modify the existing rule or define a new rule without leaving the wizard The Rule Wizards are an invaluable tool for defining the initial set of rules after installing iSecurity for the first time Activity Log The Activity Log provides complete details of every transaction captured by a security rule You have full control over which activities are included in the Activity Log and u
26. dialog agan New Session Connection W Click Import to import a pre saved connection data upon creation of an account W Check the Don t show this dialog box again to prevent prompting for new sessions of this account NOTE Data supply in this step has no persistence on disc Click Finish to connect to supplied host Connection process runs in the background enabling the user to continue working A new session node added to the account along with the nodes of the application iSecurity GUI User Manual 26 Creating New Session E iSecurity File Edit Window Help DE Q E isecurity 25 iSecurity Navigator 53 gt 5720 iSecurity 1 Nov 29 2009 2 39 04 E Anti Virus 8 6 Audit 89 5 Authority On Demand B E Business Intelligence 2 gt Capture 8 5 Central Administration 89 5 Compliance Evaluator B E Firewall H E Logs H E Maintenance 8 05 Queries and Reports 8 5 Screen H E User Management iSecurity 2 Nov 29 2009 2 59 51 n s720 isecurity 1 New Session Added Multiple sessions can be added based on the same account or different under the same account Multiple accounts can also be created Disconnecting a Session To disconnect from a session right click on a session title or on multiple sessions and select Disconnect iSecurity GUI User Manual Creating a New Session iSecurity DES tS iSecurity Navigator 53
27. e all required information for making a connection is supplied iSecurity GUI User Manual 13 Running iSecurity GUI SSL mode New Account Connection Control 3 3 Provide Connection Control Information Open connection wizard for new sessions Connection Control Run ning Encrypt the link between any sensitive file and the GUI interface using Eclipse SSL system iSecu rity GUI 1 Opena web browser to your Power i system usually port 2001 is used Click on in SSL mode Digital Certificate manager On the left click on Install Local CA Certificate on Your PC click on Copy and paste certificate Cut and paste the certificate into notepad save the file with a name such as ca txt to iSecurity installation location c programfiles isecurity by default 2 On your PC open the command prompt and change directory to iSecurity installation location c program files isecurity by default 3 From that location use the Java tool keytool to import the certificate into a trust list Issue the command jre bin keytool import v trustcacerts alias lt aliasName gt iSecurity GUI User Manual 14 Running iSecurity GUI in SSL mode file ca txt keystore trustlist alias is just optional This will create a file called trustlist and during the command it will prompt you to establish a password for this file 4 This step can be performed either from command line or from within the GUI itself ilCommand line
28. e rights that we gave you You must make sure that they too receive or can get the source code If you link other code with the library you must provide complete object files to the recipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the users of a free program by GNU LESSER GENERAL PUBLIC LICENSE GNU LESSER GENERAL PUBLIC LICENSE GUI User Manual obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU
29. emains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied GNU LESSER GENERAL PUBLIC LICENSE GUI User Manual function or table used by this function must be optional if the application does not supply it the square root function must still compute square roots These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Library and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Library the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work based on the Library on a volume of a storage or distribution medium does not brin
30. en Editors Display in Navigator View Editor Filter editors have a built in filter that also suggest filter criteria iSecurity GUI User Manual 57 Editors Actions 2 gt Ea 5720 5 1 Audit Actions Audit FULL 3 min idle Actions w gt El Action 2 Clear input 2 Ex Action Description QSEC170244 Created by QSEC170333 Created by Actil QSEC112137 Created by QSEC170333 QSEC170244 Opens suggestions dialog based Suggestions as on the input d Filtered __ Delete Open Editor Filter Click Browse to open the suggestions dialog box based on the input iSecurity GUI User Manual 58 Preferences Ghoose Value Values available for Action COE QSEC170244 QSEC170333 QSEC112137 1 item s Suggestions Dialog Preferences Export To define the field separator for CSV outputs such as Excel or Open Document used in the logs go to Window Preferences gt iSecurity gt Export iSecurity GUI User Manual 59 Preferences Preferences amp Instal Update Security Export Local To define the local time and date go to Window gt Preferences gt iSecurity gt Local iSecurity GUI User Manual 60 Preferences Preferences Local Date and Time Click the Sample Date link to choose a date iSecurity GUI
31. eport a problem or debug Set the console definitions such as the color of the error and standard records as well as the font type from Preferences gt iSecurity gt Console iSecurity GUI User Manual 34 Screens and Editors ius Preferences type fiter text Console General Help Capture standard output stream C Bold J italic T dgio Capture standard error stream mmm C Bold J italic Security cM Show Console Export to CSV Locale Log Mail To Console Definitions Screens and Editors The navigator icons are differently designed according to what they display iSecurity GUI User Manual 35 Screens and Editors S 7 Global IP Filtering L Incoming IP Addresses L Incoming Remote System Names L Outgoing IP Addresses E Global Parameters E Intrusion Detection t Logon amp Objects Port Restrictions amp t Rule Wizards B IFS Objects External S Incoming IP Address Firewall Native Objects Window Outgoing IP Address Firewall 5 Users Scheduler Firewall Server Settings E Time groups Firewall gt Users and Groups 8 65 Logs Screens and Editors Editors Click on Open Editors tool bar button to search editor name prefix or pattern Development iSecurity 1 Nov 30 2009 3 26 55 8 5 Anti Virus 8 5 Audit W E Authority On Demand Open Editors iSecurity GUI User Manual 36 Screens and Editors
32. ers and Groups Queries and Reports Scheduler Firewall ev Done 7 X Using the help system Browse topics in the Contents frame 8 on the left Click on a topic to have it displayed Use the Back and Forward buttons to navigate within the history of viewed topics Searching To quickly locate topics on a particular subject in the documentation enter a query in the Search field Use the Search frame 4 to display the Search view You can narrow the scope of your hu ealactine anh tha eactianc Define Default Settings Go to Window Preferences gt Help and define the Help default settings iSecurity GUI User Manual 49 Editors Preferences the dynamic help view the help browser In the dynamic help view Help Preferences Editors Most editors whether forms or tables have an internal tool bar which also shows load status iSecurity GUI User Manual 50 Editors Intrusion Detection 2 Detected Intrusion End the offending interactive session 0 Send message to the user Disable user Prevent specific users from being disabled automatically 0 Send email to Security Administrator Email TZION RAZLEE COM Run Action If Action is installed 0 Write to QAUDJRN security audit journal Audit journal code is U Journal entry type is FW Data format SMZ8 GSCALP
33. f the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You modify your or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a software library b You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change C You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License d Ifa facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility other than as an argument passed when the facility is invoked then you must make a good faith effort to ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose r
34. g the other work under the scope of this License 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that version instead if you wish Do not make any other change in these notices Once this change is made in a given copy it is irreversible for that copy so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy This option is useful when you wish to copy part of the code of the Library into a program that is not a library 4 You may copy and distribute the Library or a portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even th
35. hted in the example above Console Display the full job log in real time Go to Window Show View Console The console view appears 5 isecurity File Edit Help 0 Reset Window ts Navigator 6 Progress E Properties Preferences 48 Nevelanment Console iSecurity GUI User Manual 47 Help Help Console 25 9 iSecurity DSPAPCRJ APP DEMO3 JOB ALL NBRRCDS NOMAX FROMTIME DSPAPCRJ APP DEMO3 JOB ALL NBRRCDS NOMAX FROMTIME Generating report AS400logOnly connected 23009998 Connected JOB QZRCSRVS QUSER 658829 Preparing Operation Waiting for Data Retrieving Data Input size is 100 100 Job ended successfully Console iSecurity GUI User Manual A new Help contents available in HTML format that support links and bookmarks for easier navigation The Help also support a search engine 48 Help Help iSecurity Search 60 Search scope topics 2 9 gt E E E E E El EH E HE lt a Introducing iSecurity Getting Started Anti Virus Audit Authority on Demanc Capture Firewall IP Filtering Intrusion Detection Logon Objects Port Restriction Rule Wizards Server Settings System Configuration Time Groups Us
36. nauthorized use It pro vides adjustable terminal and user specific time out capabilities Password Password provides a first tier wall of defense for users by ensuring that user passwords cannot be easily cracked and guessed AP Journal AP Journal automatically manages database changes by documenting and reporting exceptions made to the database journal iSecurity GUI User Manual 9 iSecurity iSecurity GUI User Manual 10 Getting Started 2 Create a New Account Chapter 2 Getting Started Create a New 1 Click the iSecurity symbol on your desktop Account 2 Right click in the iSecurity navigator view 3 Select New Account the Account Name screen appears Type account name and click Next New Account Account Name Provide display name for this account Name Cancel New Account 4 Inthe Connection screen enter Host User and Password in the correct fields and click Finish or Next iSecurity GUI User Manual 12 Create a New Account New Account Connection 2 3 Connection information Host User Password Operator Password C Use SSL Information you supply is encrypted by Secure storage New Account Connection 5 Whenclicking Next the Connection Control screen appears Check the Open Connection Wizard if you whish the application to prompted for new sessions This is just a conveniences issue that suits those cases wher
37. nder which conditions Highly defined filter criteria allow you to select only those records that you need to examine by using Boolean operators and the ability to combine complex logical conditions You have full flexibility to specify the sort order according to multiple fields Business Intelligence Visualizer Visualizer is an advanced data warehouse solution for graphically displaying security data It allows IT managers to analyze security related system activity quickly and easily using a iSecurity GUI User Manual 6 System Requirements stunning graphical interface Visualizer eliminates the need for time consuming log scan ning and tracking activities that tie up system resources and increase operating costs System W PC workstation due to the use of Java 6 Requirements Windows XP Professional SP1 B Windows XP Home Windows 2000 Professional SP3 Windows Server 2003 Web Edition Windows Server 2003 Standard Edition Windows Vista Operating system GUI connects to V5R1 and higher of OS400 Minimum RAM atleast 128M TCP IP communication to the iSeries or AS 400 STRTCPSVR SERVER DDM to start the TCP IP server with DDM specified for the Server parameter Host servers should be started on the server STRHOSTSVR SERVER ALL from the as400 command prompt QUSER user profile enabled and has a valid password E Disk Space Required currently at least 160M but it is going
38. nk with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License to do so and all its vii GNU LESSER GENERAL PUBLIC LICENSE GUI User Manual terms and conditions for copying distributing or modifying the Library or works based on it 10 Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original licensor to copy distribute link with or modify the Library subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with this License 11 If as a consequence of a court judgment or allegati
39. on of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any particular circum stance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made gener ous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he
40. ontaining this object code plus portions of the Library will still fall under Section 6 Otherwise if the work is a derivative of the Library you may dis tribute the object code for the work under the terms of Section 6 Any executables contain ing that work also fall under Section 6 whether or not they are linked directly with the Library itself 6 exception to the Sections above you may also combine or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must include the copyright notice for the Library among them as well as a reference directing the user to the copy of this License Also you must do one of these things Accompany the work with the complete corresponding machine readable source code for the Library including whatever changes were used in the work which must be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machine readable work that uses the Lib
41. ough third parties are not compelled to copy the source along with the object code 5 program that contains no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses GNU LESSER GENERAL PUBLIC LICENSE GUI User Manual the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data struc ture layouts and accessories and small macros and small inline functions ten lines or less in length then the use of the object file is unrestricted regardless of whether it is legally a derivative work Executables c
42. rary as object code and or source code so that the user can modify the Library and then relink to produce a modified executable containing the modified Library It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions b Usea suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version that the work was made with vi GNU LESSER GENERAL PUBLIC LICENSE GUI User Manual C Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing this distribution d If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place e Verify that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any data and
43. razlee com Record your product authorization code here Computer Model Serial Number Authorization Code About This Manual Who Should Read This Book Terminology Documentation Overview Typography Conventions This user guide is intended for all System i system administrators and in particular for secu rity administrators responsible for the implementation and management of security on Sys tem i systems This manual attempts to adhere to standard IBM iSeries System 1 terminology and conven tions whenever possible However deviations from IBM standards are employed in certain circumstances in order to enhance clarity or when standard IBM terminology conflicts with generally accepted industry conventions Raz Lee takes customer satisfaction seriously Therefore our products are designed for ease of use The documentation package includes a variety of materials to get you up to speed with this software quickly and effectively Printed Materials This user guide is the only printed documentation necessary for understanding this product It is available in user friendly PDF format and may be displayed or printed using Adobe Acrobat Reader version 4 0 or higher Acrobat Reader is included on the product CD ROM This manual contains concise explanations of the various product features as well as step by step instructions for using and configuring the product On Line Help PC based on line help is also a
44. rity is a comprehensive network security solution that completely secures your Sys tem i against all known external threats and also controls what users are allowed to do after access is granted iSecurity is a robust cost effective security solution iSecurity is by far the most intuitive and easy to use security software product on the mar ket today Its top down functional design and intuitive logic create a work environment that even novices can master in minutes iSecurity features a user friendly Java based GUI and an System i Navigator OpsNav plug in Once upon a time the System i was used almost exclusively in a closed environment with host systems connected to remote data terminals via proprietary technologies Within this closed environment the security features of the OS 400 operating system provided the strongest data and system security in the world User profiles menus and object level secu rity provided all the tools necessary to control what users were allowed to see and do In today s world of enterprise networks PCs distributed databases the Internet and web technologies closed computing environments are all but extinct Technological advances compelled IBM to open up the System i and its OS 400 operating system to the rest of the world This new openness brought with it many of the security risks inherent in distrib uted environments The simple fact is that users accessing the System i and its databases e
45. software are designed to take away your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it You can use it too but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any partic ular case based on the explanations below When we speak of free software we are refer ring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it For exam ple if you distribute copies of the library whether gratis or for a fee you must give the recipients all th
46. t ox Deleting an Account can be deleted by right clicking on it and selecting Delete Account iSecurity GUI User Manual 22 Account Sessions File Edit Window Help ma G5 iSecurity Navigator 3 A New Account New Session Go Into ge Edit 5 Paste Ctrl V Copy Ctrl C Rename F2 Delete Delete Properties Alt Enter Delete Account Deleting account will disconnect all sessions under this account NOTE f a session has an unsaved data the user will receive a warning asking him to confirm the action Account Select Sessions to view how many sessions are open for this account Sessions iSecurity GUI User Manual 23 Creating a New Session Properties for S720 Sessions Creating a New There are three options to create a new session based on the account s data Session Rightclick the account and select New Session Double click the account if it hasn t got sessions Click on the node s handle if it hasn t got sessions iSecurity GUI User Manual 24 Creating New Session iSecurity New Session iSecurity GUI User Manual 25 Creating a New Session S720 New Session Connection Connection information Host 1 1 1 100 User reuti Password Operator Password Show Passwords use 551 Current SSL settings pont show ths
47. to grow I don t have an estimation yet iSecurity GUI User Manual 7 iSecurity iSecurity iSecurity GUI User Manual Raz Lee s iSecurity is an integrated state of the art security solution for all System i sys tems providing cutting edge tools for managing all aspects of network access data and audit security Its individual components work together transparently providing comprehen sive out of the box security Other iSecurity products include Assessment Assessment checks your ports sign on attributes user privileges passwords terminals and more Results are instantly provided with a score of your current network security sta tus with its present policy compared to the network if iSecurity were in place Firewall Firewall protects and secures all types of access to and from the System i within or out side the organization under all types of communication protocols Firewall manages user profile status secures entry via pre defined entry points and profiles activity by time Its Best Fit algorithm determines the validity of any security related action hence significantly decreasing system burden while not compromising security Audit Audit is a security auditing solution that monitors System i events in real time It includes a powerful query generator plus a large number of predefined reports Audit can also trigger customized responses to security threats by means of the integrated script processor
48. to support razlee com Parameter Description Opens the log file using the default text editor iSecurity GUI User Manual 45 Reporting problems in iSecurity GUI Parameter Description Open Containing Useful if you wish to send the file as an attachment Folder Browse Set a different log file location and name View Job Log Entries Using this option the user will be able to find the error reason easily 1 Ajob error will trigger an error massage alert o Error while inserting job schedule entry Reason Job schedule entry AUGMONDAY number not added 2 Click the Job Log Entries button to view the job log last 10 records iSecurity GUI User Manual 46 Reporting problems in iSecurity GUI Job Log Entries CPF5C61 Severity 0 Client request run program QSYS QWCCVTDT CPF5C61 Severity 0 Client request run program QSYS QWCCVTDT CPF5C61 Severity 0 Client request run program QSYS QWCCVTDT CPFSC61 Severity 0 Client request run program QSYS QWCCVTDT CPFSC61 Severity 0 Client request run program QSYS QWCCVTDT CPF5C61 Severity 0 Client request run program QSYS QWCCVTDT CPF5C61 Severity 0 Client request run program LIBL QUSRJOBI CPF5C61 Severity 0 Client request run ram SMZ4 AURUNGUI CPF1633 Severity 40 Job schedule entry AUGMONDAY number N not added Job Log Records Display 3 error reason is highlig
49. utility programs needed for reproducing the executable from it However as a special exception the materials to be distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things Accompany the combined library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under the terms of the Sections above b Give prominent notice with the combined library of the fact that part of it is a work based on the Library and explaining where to find the accompanying uncombined form of the same work You may not copy modify sublicense li
50. vailable in JavaHelp format Click the Help button from your Firewall menubar This document is intended to be printed by the end user and viewed on line using a variety of different PC platforms Accordingly it was written using standard Windows TrueType fonts that are installed on virtually all systems You do not need to install any special fonts in order to view or print this document W text appears in 10 point Times New Roman Menu options field names and function key names appear in Arial Bold OS 400 commands system values data strings etc appear in Bold Italic Key combinations are separated by a dash for example Shift Tab Referrals to chapters or procedures appear in Times New Roman Italic Table of Contents Gopyright r i Lap ic e ii Who Should Read This Book ii ii Documentation Overview 22 4 44 0 000 0 nennen nnne nnn ii Print d mM ii doce ii Typography Conventions ida eet ii Chapter 1 Introducing iSecurity 4 Whatis 2 4 Why You Miele vM 4 How iSecurity Works 4 Top Down Sec nty 4 iSecurity Rules and
51. xternally can easily bypass native OS 400 security System administrators need to equip themselves with a new generation of security tools to combat these evolving threats iSecurity is just such a tool It enhances native OS 400 by controlling access via all known external sources and control ling precisely what users are permitted to do once access is granted Top Down Security Design Top down security design means that the process of designing and applying security rules follows the most efficient and logical path possible In other words this means you have to design far fewer rules in order to achieve maximum security and your System i needs to pro cess apply rules to far fewer transactions than many similar products You save planning and maintenance time as well as valuable system resources Top down security designs a simple hierarchy of rule types When a higher level rule type fully meets your security requirements you do not need to define any more rules for that sit uation The following drawing illustrates this concept How iSecurity Works Top Down Security Design Each Server TCP IP amp SNA Firewall Incoming amp Outgoing Userto Server Sooess Security Command Verb Security Userto Object Access Security Native 05 400 and IFS Objects Object Management Authority FTP Telnet WSG Passthrough Logon Control Automatic User Profile Swapping iSecurity Top Down Security
52. your local disk Click New Archived Site A Select file dialog will open point it to the location of the zip file supplied to you On the Local Site dialog click OK 43 Reporting problems in iSecurity GUI Reporting problems in iSecurity GUI The iSecurity GUI module writes output to a log file By default problems are written to the log file which should be e mailed to support razlee com Log Preferences window 1 Open the Preferences dialog from iSecurity s menu bar os isecurity Edit Mm Help Show View mes Reset Window ts Securit Preferences 8 iSecurity 2 Click on the Log node iSecurity GUI User Manual 44 Reporting problems in iSecurity GUI Preferences type filter text Log General Help Log File Instal Update C Documents and Settings Winlisecurity workspace3 metadata pl SSL Settings iSecurity Open Containing Folder Clear Console to CSV Clear log on application start Local Mail To Capture standard output stream Capture standard error stream Preferences NOTE Changes made on this screen take effect after iSecurity is restarted By default the log file is cleared when iSecurity starts and only errors are printed to it You may be asked by the Raz Lee Technical Support team to check the Capture standard output stream box re create the error and then re send the log file
Download Pdf Manuals
Related Search
Related Contents
Digital Networks North America PCXBV-Ux User's Manual NAKIVO Backup & Replication v4 User Guide Avec La Caisse d`Epargne Bénévolat à l`Honneur 取扱説明書はこちら - Tahmazo JP balkan theater - e-HAF Felicitaciones por la compra de equipos !! MANUAL DEL USUARIO Operation Manual System View SC5000 Impostazioni della Drum Track Samsung 32" LED-TV F6105 Käyttöopas 49-995型 取扱説明書 保証書付 遠赤外線式温水ホームサウナ Copyright © All rights reserved.
Failed to retrieve file