
Table Of Contents
USING THIS GUIDE---------------------------------------------------------------------------------------- Intro -1
USING THE SCREENS ------------------------------------------------------------------------------------ Intro -3
INSTALLING SENTRY------------------------------------------------------------------------------------ Intro -5
GETTING STARTED--------------------------------------------------------------------------------------- Intro -8
INTRODUCING THE MAIN MENU ------------------------------------------------------------------Intro -12
1. INTRODUCING THE DATABASE CREATION AND VALIDATION MENU----------- 1 -1
1.0 DATABASE CREATION AND VALUDATION MENU------------------------------------------- 1 -2
1.1 UPLOAD USER AND GROUP PROFILES FROM UNIX----------------------------------------- 1 -4
1.2 CREATE DATABASE FROM FILE SYSTEM ------------------------------------------------------ 1 -6
1.3 VALIDATE THE USER PROFILE DATABASE ---------------------------------------------------- 1 -7
2. INTRODUCING THE DATABASE MAINTENANCE MENU-------------------------------- 2 -1
2.0 DATABASE MAINTENANCE-------------------------------------------------------------------------- 2 -2
2.1 SYSTEM PROFILE MAINTENANCE ---------------------------------------------------------------- 2 -4
2.2 USER MAINTENANCE ---------------------------------------------------------------------------------2 -10
2.3 GROUP MAINTENANCE-------------------------------------------------------------------------------2 -18
2.4 FILE SYSTEM---------------------------------------------------------------------------------------------2 -23
ACLs Maintenance-------------------------------------------------------------------------------------------2 -28
More File Manager Views ----------------------------------------------------------------------------------2 -31
2.5 COMMAND MAINTENANCE-------------------------------------------------------------------------2 -34
2.6 USER ITEM PROTECTION MAINTENANCE-----------------------------------------------------2 -38
3. INTRODUCING THE REPORTS MENU -------------------------------------------------------------- 3 -1
3.0 REPORTS MENU------------------------------------------------------------------------------------------ 3 -2
3.1 SYSTEM PROFILE REPORT--------------------------------------------------------------------------- 3 -4
3.2 USER PROFILES ------------------------------------------------------------------------------------------ 3 -9
3.3 GROUPS REPORT ---------------------------------------------------------------------------------------3 -11
3.4 ACCOUNT PROTECTION REPORT-----------------------------------------------------------------3 -13
3.5 COMMAND PROTECTION REPORT ---------------------------------------------------------------3 -15
3.6 ACCESS VIOLATIONS REPORT---------------------------------------------------------------------3 -17
4. INTRODUCING THE UTILITIES MENU ------------------------------------------------------------- 4 -1
4.0 UTILITIES MENU----------------------------------------------------------------------------------------- 4 -2
4.1 VOC PROTECTION SETUP ---------------------------------------------------------------------------- 4 -4
4.2 PUGING THE VIOLATIONS LOG -------------------------------------------------------------------- 4 -5
4.3 PASSWORD CREATION -------------------------------------------------------------------------------- 4 -7
4.4 REBUILD CROSS REFERENCE FILES-------------------------------------------------------------4 -10
4.5 UPDATE PROTECTED COMMANDS---------------------------------------------------------------4 -11
APPENDIX 1 ---------------------------------------------------------------------------------------------Appendix -1
SENTRY INTERNAL SUBROUTINES----------------------------------------------------------- Appendix -1
Subroutine: SENTRY.ENCRYPT------------------------------------------------------------------ Appendix -1
DATA ENCRYPTION------------------------------------------------------------------------------- Appendix -2
Subroutine: SENTRY.USER.ITEM.CONTROL------------------------------------------------- Appendix -3
Subroutine: SENTRY.VIOLATION.STAMP----------------------------------------------------- Appendix -6
APPENDIX 2 ------------------------------------------------------------------------------------------ Appendix 2 -1
SENTRY KEY BINDINGS ------------------------------------------------------------------------Appendix 2 -1