M
- -M option, auditreduce command,
How to Merge Audit Files From the Audit Trail
- -m option
- cryptoadm command
How to Prevent the Use of a User-Level Mechanism
How to Prevent the Use of a Kernel Software Provider
- Kerberized commands,
Overview of Kerberized Commands
- mac command
- description,
User-Level Commands in the Oracle Solaris Cryptographic Framework
- syntax,
How to Compute a MAC of a File
- machine security, See system security
- MACS keyword, Solaris Secure Shell,
Keywords in Solaris Secure Shell
- mail, using with Solaris Secure Shell,
How to Use Port Forwarding in Solaris Secure Shell
- makedbm command, description,
Commands That Manage RBAC
- managing
- See also administering
- audit files
How to Merge Audit Files From the Audit Trail
How to Prevent Audit Trail Overflow
- audit records task map,
Managing Audit Records (Task Map)
- audit trail overflow,
How to Prevent Audit Trail Overflow
- auditing,
Solaris Auditing (Task Map)
- auditing in zones
Auditing on a System With Zones
Auditing and Solaris Zones
- device allocation task map,
Managing Device Allocation (Task Map)
- devices,
Managing Device Allocation (Task Map)
- file permissions,
Protecting Files (Task Map)
- keystores with KMF,
KMF Keystore Management
- passwords with Kerberos,
Kerberos Password Management
- privileges task map,
Managing Privileges (Task Map)
- RBAC task map,
Managing RBAC (Task Map)
- manifests
- See also bart create
- control,
Basic Audit Reporting Tool (Overview)
- customizing,
How to Customize a Manifest
- file format,
BART Manifest File Format
- test,
BART Report
- manually configuring
- Kerberos
- master KDC server,
How to Manually Configure a Master KDC
- master KDC server using LDAP,
How to Configure a KDC to Use an LDAP Data Server
- slave KDC server,
How to Manually Configure a Slave KDC
- mapping
- host names onto realms (Kerberos),
Mapping Host Names Onto Realms
- UIDs to Kerberos principals,
Using the gsscred Table
- mapping GSS credentials,
Mapping GSS Credentials to UNIX Credentials
- mappings, events to classes (auditing),
Audit Classes and Preselection
- mask (auditing)
- description of process preselection,
Proscess Audit Characteristics
- system-wide process preselection,
audit_control File
- mask ACL entries
- default entries for directories,
ACL Entries for UFS Directories
- description,
ACL Entries for UFS Files
- setting,
How to Add ACL Entries to a File
- master files (ASET)
System Files Checks
ASET Master Files
The Checklist Files
- master KDC
- configuring with LDAP,
How to Configure a KDC to Use an LDAP Data Server
- definition,
Kerberos-Specific Terminology
- manually configuring,
How to Manually Configure a Master KDC
- slave KDCs and
Kerberos Servers
Configuring KDC Servers
- swapping with slave KDC,
Swapping a Master KDC and a Slave KDC
- max_life value, description,
Ticket Lifetimes
- max_renewable_life value, description,
Ticket Lifetimes
- MaxAuthTries keyword, sshd_config file,
Keywords in Solaris Secure Shell
- MaxAuthTriesLog keyword, sshd_config file,
Keywords in Solaris Secure Shell
- MaxStartups keyword, sshd_config file,
Keywords in Solaris Secure Shell
- MD5 encryption algorithm, kernel provider,
How to List Available Providers
- MD5 encryption algorithm, policy.conf file,
How to Specify an Algorithm for Password Encryption
- mech_dh mechanism
- GSS-API credentials,
Acquiring GSS Credentials in Solaris Secure Shell
- secure RPC,
How to Set Up a Diffie-Hellman Key for an NIS+ Host
- mech_krb mechanism, GSS-API credentials,
Acquiring GSS Credentials in Solaris Secure Shell
- mech_list option, SASL and,
SASL Options
- mechanism, definition in cryptographic framework,
Terminology in the Oracle Solaris Cryptographic Framework
- mechanisms
- disabling all on hardware provider,
How to Disable Hardware Provider Mechanisms and Features
- enabling some on hardware provider,
How to Disable Hardware Provider Mechanisms and Features
- medium ASET security level,
ASET Security Levels
- merging, binary audit records,
How to Merge Audit Files From the Audit Trail
- message authentication code (MAC), computing for file,
How to Compute a MAC of a File
- messages file, executable stack messages,
Preventing Executable Files From Compromising Security
- metaslot
- administering,
Administrative Commands in the Oracle Solaris Cryptographic Framework
- definition in cryptographic framework,
Terminology in the Oracle Solaris Cryptographic Framework
- microphone
- allocating,
How to Allocate a Device
- deallocating,
How to Deallocate a Device
- minfree line
- audit_control file,
audit_control File
- audit_warn condition,
audit_warn Script
- minus sign (-)
- audit class prefix,
Audit Class Syntax
- entry in sulog file,
How to Monitor Who Is Using the su Command
- file permissions symbol,
File Permission Modes
- symbol of file type,
File and Directory Ownership
- mode, definition in cryptographic framework,
Terminology in the Oracle Solaris Cryptographic Framework
- modifying
- policies (Kerberos),
How to Modify a Kerberos Policy
- principal's password (Kerberos),
How to Modify a Kerberos Principal
- principals (Kerberos),
How to Modify a Kerberos Principal
- role assignment to a user,
How to Create and Assign a Role by Using the GUI
- roles (RBAC),
How to Change the Properties of a Role
- users (RBAC),
How to Change the RBAC Properties of a User
- modules, password encryption,
Password Encryption
- monitoring
- audit trail in real time,
Auditing Efficiently
- failed logins,
How to Monitor Failed Login Attempts
- su command attempts
Limiting and Monitoring Superuser
How to Monitor Who Is Using the su Command
- superuser access attempts,
How to Restrict and Monitor Superuser Logins
- superuser task map,
Monitoring and Restricting Superuser (Task Map)
- system usage
Monitoring Use of Machine Resources
Monitoring File Integrity
- use of privileged commands,
How to Audit Roles
- mount command, with security attributes,
How to Authorize Users to Allocate a Device
- mounting
- allocated CD-ROM,
How to Mount an Allocated Device
- allocated devices,
How to Mount an Allocated Device
- allocated diskette,
How to Mount an Allocated Device
- audit directories,
Audit Trail
- files with DH authentication,
How to Share NFS Files With Diffie-Hellman Authentication
- mt command, tape device cleanup and,
Device-Clean Scripts