PATROL Agent security methods
The following table lists the methods available for maintaining security for the PATROL Agent and tells you where you can find instructions for changing security.
Methods for maintaining security for the PATROL Agent
Method of maintaining security | How security Is established | Task reference |
---|---|---|
Security levels | Allows you to install one of five security level policies which secure the dataflow between the PATROL Agent, and PATROL Consoles. | |
User account | The default account for commands run by the agent is specified by the defaultAccount variable in the agent configuration file. The agent cannot run application discovery and parameters properly without a valid user name. | |
User and host names | The Access Control List (ACL) is defined by an agent configuration variable. The ACL specifies which user names can be used with which computers when connecting with an agent. | |
Directory and file ownership and permissions | The PATROL_HOME/log and PATROL_HOME/config directories are created when the PATROL Agent process is run for the first time. At that time, the ownership and permissions of the PATROL Agent log and configuration directories are set. | |
PATROL Access Control | Access is controlled by configuration variables in patrol.conf |
Comments
Log in or register to comment.