M
- -M option, auditreduce command, How to Merge Audit Files From the Audit Trail
- -m option
- cryptoadm command
- How to Prevent the Use of a User-Level Mechanism
- How to Prevent the Use of a Kernel Software Provider
- Kerberized commands, Overview of Kerberized Commands
- mac command
- description, User-Level Commands in the Oracle Solaris Cryptographic Framework
- syntax, How to Compute a MAC of a File
- machine security, See system security
- MACS keyword, Secure Shell, Keywords in Secure Shell
- mail, using with Secure Shell, How to Use Port Forwarding in Secure Shell
- makedbm command, description, Commands That Manage RBAC
- managing
- See also administering
- audit files
- How to Merge Audit Files From the Audit Trail
- How to Prevent Audit Trail Overflow
- audit records task map, Managing Audit Records (Task Map)
- audit trail overflow, How to Prevent Audit Trail Overflow
- auditing, Oracle Solaris Auditing (Task Map)
- auditing in zones
- Auditing on a System With Oracle Solaris Zones
- Auditing and Oracle Solaris Zones
- device allocation task map, Managing Device Allocation (Task Map)
- devices, Managing Device Allocation (Task Map)
- file permissions, Protecting Files (Task Map)
- keystores with KMF, KMF Keystore Management
- passwords with Kerberos, Kerberos Password Management
- privileges task map, Managing Privileges (Task Map)
- RBAC task map, Managing RBAC (Task Map)
- manifests
- See also bart create
- control, Basic Audit Reporting Tool (Overview)
- customizing, How to Customize a Manifest
- file format, BART Manifest File Format
- test, BART Report
- manually configuring
- Kerberos
- master KDC server, How to Manually Configure a Master KDC
- master KDC server using LDAP, How to Configure a KDC to Use an LDAP Data Server
- slave KDC server, How to Manually Configure a Slave KDC
- mapping
- host names onto realms (Kerberos), Mapping Host Names Onto Realms
- UIDs to Kerberos principals, Using the gsscred Table
- mapping GSS credentials, Mapping GSS Credentials to UNIX Credentials
- mappings, events to classes (auditing), Audit Classes and Preselection
- mask (auditing)
- description of process preselection, Proscess Audit Characteristics
- system-wide process preselection, audit_control File
- mask ACL entries
- default entries for directories, ACL Entries for UFS Directories
- description, ACL Entries for UFS Files
- setting, How to Add ACL Entries to a File
- master files (ASET)
- System Files Checks
- ASET Master Files
- The Checklist Files
- master KDC
- configuring with LDAP, How to Configure a KDC to Use an LDAP Data Server
- definition, Kerberos-Specific Terminology
- manually configuring, How to Manually Configure a Master KDC
- slave KDCs and
- Kerberos Servers
- Configuring KDC Servers
- swapping with slave KDC, Swapping a Master KDC and a Slave KDC
- max_life value, description, Ticket Lifetimes
- max_renewable_life value, description, Ticket Lifetimes
- MaxAuthTries keyword, sshd_config file, Keywords in Secure Shell
- MaxAuthTriesLog keyword, sshd_config file, Keywords in Secure Shell
- MaxStartups keyword, sshd_config file, Keywords in Secure Shell
- MD5 encryption algorithm, kernel provider, How to List Available Providers
- MD5 encryption algorithm, policy.conf file, How to Specify an Algorithm for Password Encryption
- mech_dh mechanism
- GSS-API credentials, Acquiring GSS Credentials in Secure Shell
- secure RPC, How to Set Up a Diffie-Hellman Key for an NIS+ Host
- mech_krb mechanism, GSS-API credentials, Acquiring GSS Credentials in Secure Shell
- mech_list option, SASL and, SASL Options
- mechanism, definition in cryptographic framework, Terminology in the Oracle Solaris Cryptographic Framework
- mechanisms
- disabling all on hardware provider, How to Disable Hardware Provider Mechanisms and Features
- enabling some on hardware provider, How to Disable Hardware Provider Mechanisms and Features
- Media Backup rights profile
- assigning to trusted users
- RBAC: An Alternative to the Superuser Model
- How to Create a Role From the Command Line
- Media Restore rights profile, assigning to trusted users, How to Create a Role From the Command Line
- medium ASET security level, ASET Security Levels
- merging, binary audit records, How to Merge Audit Files From the Audit Trail
- message authentication code (MAC), computing for file, How to Compute a MAC of a File
- messages file, executable stack messages, Preventing Executable Files From Compromising Security
- metaslot
- administering, Administrative Commands in the Oracle Solaris Cryptographic Framework
- definition in cryptographic framework, Terminology in the Oracle Solaris Cryptographic Framework
- microphone
- allocating, How to Allocate a Device
- deallocating, How to Deallocate a Device
- minfree line
- audit_control file, audit_control File
- audit_warn condition, audit_warn Script
- minus sign (-)
- audit class prefix, Audit Class Syntax
- entry in sulog file, How to Monitor Who Is Using the su Command
- file permissions symbol, File Permission Modes
- symbol of file type, File and Directory Ownership
- mode, definition in cryptographic framework, Terminology in the Oracle Solaris Cryptographic Framework
- modifying
- policies (Kerberos), How to Modify a Kerberos Policy
- principal's password (Kerberos), How to Modify a Kerberos Principal
- principals (Kerberos), How to Modify a Kerberos Principal
- role assignment to a user, How to Create and Assign a Role by Using the GUI
- roles (RBAC), How to Change the Properties of a Role
- users (RBAC), How to Change the RBAC Properties of a User
- modules, password encryption, Password Encryption
- monitoring
- audit trail in real time, Auditing Efficiently
- failed logins, How to Monitor Failed Login Attempts
- su command attempts
- Limiting and Monitoring Superuser
- How to Monitor Who Is Using the su Command
- superuser access attempts, How to Restrict and Monitor Superuser Logins
- superuser task map, Monitoring and Restricting Superuser (Task Map)
- system usage
- Monitoring Use of Machine Resources
- Monitoring File Integrity
- use of privileged commands, How to Audit Roles
- mount command, with security attributes, How to Authorize Users to Allocate a Device
- mounting
- allocated CD-ROM, How to Mount an Allocated Device
- allocated devices, How to Mount an Allocated Device
- allocated diskette, How to Mount an Allocated Device
- audit directories, Audit Trail
- files with DH authentication, How to Share NFS Files With Diffie-Hellman Authentication
- mt command, tape device cleanup and, Device-Clean Scripts