- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: need to know the difference between trusted an...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-26-2005 07:23 AM
тАО02-26-2005 07:23 AM
i like to know the differences between trusted and non-trusted systems and why its needed?
also like to know about securepath..
regards
shankar
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-26-2005 07:31 AM
тАО02-26-2005 07:31 AM
Solution- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-27-2005 02:45 AM
тАО02-27-2005 02:45 AM
Re: need to know the difference between trusted and non-trusted
- auditing
- shadow password
- user expiring
- password setup policies
etc.
There is a lot more, i recomend that you allways use trusted systems.
Read more in the document below!
http://docs.hp.com/en/B2355-90121/index.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-28-2005 12:32 AM
тАО02-28-2005 12:32 AM
Re: need to know the difference between trusted and non-trusted
HP StorageWorks Secure Path satisfies the customer requirement for solutions that provide no-single-point-of-failure in a storage area network (SAN) and external storage solutions. In addition, Secure Path provides path management infrastructure for technologies such as disaster tolerance and high availability clusters.
Secure Path is multi-path, high availability software that manages and maintains continuous data access to HP storage systems, enabling no-single-point-of-failure from server to storage. Secure Path is host-resident software that monitors the data paths between server and storage to increase availability of information. In the event that a path failure is detected, Secure Path fails over to an alternative path. When that path becomes available, Secure Path can automatically failback to the original path.
more info available from - www.hp.com/go/securepath
Please note that this has no relationship with trusted/non-trusted systems
Regards,
Nick
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО02-28-2005 02:38 AM
тАО02-28-2005 02:38 AM
Re: need to know the difference between trusted and non-trusted
I won't try to list the differences between trusted and non-trusted systems, rather I will tell you that a system that has been converted to run in trusted mode can be made more secure by implementing additional logon, password, and terminal management security features. Below are just some of the benefits you will get by enabling your system in trusted mode ...
First of all, HP refers to the use of its C2 level software as running in trusted mode. When trusted mode is configured, it also enables the auditing capability. Auditing and system logging facilities work together to track user actions. All UNIX systems provide some basic auditing or logging functions using ASCII files/logs. C2 auditing is more complex, and tracks specific user actions on a real-time basis.
A system that has been configured to run in trusted mode enables a SA to track user activities by the system calls they evoke. You will also have tunable auditing parameters.
Also, during the system conversion to trusted mode, the process creates audit ID numbers for all users to enable specific tracking of user activities.
There's lots more benefits from enabling your system in trusted mode, this is just a quick outline on some of the security benefits I have come to depend on. Hope this helps.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО03-03-2005 08:31 AM
тАО03-03-2005 08:31 AM