| re Note 230.0 by PLDVAX::ZARLENGA >
Apparently since this doesn't appear to involve a 'hack' of any kind
the 'hackers' are unwilling to respond.
You must of tried SET FILE/AUDIT and gotten the error message of
'unrecognized qualifier \AUDIT\'
I suggest setting file protection to allow access, and have
security alarms enabled to log successful accesses.
There was a mention somewhere of being able to specifically track
a given file, but I have not found it anywhere in the normal VMS
manuals.
As far as the audit messages, ALL terminals with security logging
enabled will receive ALL messages related to security.
REPLY/ENABLE=(SECURITY)
And yes, you do need privileges (OPER and SECURITY) to enable
your terminal. Once it's set, it remains enabled until reboot
or REPLY/DISABLE.
SHOW/AUDIT will list the current alarm settings for the system.
There is a command procedure to examine the operator log for
security messages.
SYS$SYSTEM:SECAUDIT.COM
I've not used it, but it is documented somewhere.
SLH
|
| re: .0, .2
Yes, set it in the ACL, but the correct answer is "all of the above".
Your "OPCOM" is actually in the form "REPLY/ENABLE=SECURITY". This
must be running all the time somewhere.
You must set the file's ACL entry to include a security audit. See
the VMS booklet "Guide to Security on VAX/VMS systems". You must
also have your SECURITY privs on for the security terminal (the
one running REPLY/ENABLE=SECURITY :-)
Finally, note that all of this stuff is a real pig to run, so I
would not recommend it for many files. Use it at the directory level
or at least use it sparingly - you accrue a LOT of overhead when
you enable security alarms.
Hope it helps, even coming late
-pjh
|