HP 3000 Manuals

Ch 7. Securing HP Desk [ HP DeskManager Administration ] MPE/iX 5.0 Documentation


HP DeskManager Administration

Chapter 7  Securing HP Desk 

Before you configure your system and have it up and running in your
organization, it is important that you consider what needs to be done to
protect it from internal abuse and external intrusion.

This chapter examines the levels of security:

   *   How users can protect their own Desks and files.

   *   Assigning users to the various privileged capability groups.

   *   Protecting the HP Desk program and data files.

   *   Controlling users' passwords.



MPE/iX 5.0 Documentation