ADSM-L

Re: [ADSM-L] Securing TSM Client

2010-05-12 10:29:06
Subject: Re: [ADSM-L] Securing TSM Client
From: Leandro Mazur <leandromazur AT GMAIL DOT COM>
To: ADSM-L AT VM.MARIST DOT EDU
Date: Wed, 12 May 2010 11:28:09 -0300
Humm...that's interesting...I'll take a look ! Thanks Richard !

On Wed, May 12, 2010 at 8:18 AM, Richard Sims <rbs AT bu DOT edu> wrote:

> Leandro -
>
> The problem you're dealing with is a personnel management one, which can't
> be solved by technology alone.  The management there is the only avenue of
> solution.
>
> Technology can help, though.  You can harvest records from the dsmaccnt.log
> to compile a report to management demonstrating the times and data amounts
> that inappropriate people have been performing TSM actions on that client,
> by virtue of field 7 containing a username whenever dsmc is invoked by an
> individual.  You could go further by having a dsmadmc-based monitor
> performing Query SEssion Format=Detailed to look for sessions from that
> node: where the User Name is inappropriate, the monitor could then cancel
> the session and send a notification of the usage violation.
>
>    Richard Sims    at Boston University
>



--
__________________________________
Leandro Mazur

<Prev in Thread] Current Thread [Next in Thread>