

Writing Command Limiting Rules › Implementing Command Limiting
Implementing Command Limiting
You can implement command limiting when CA ACF2 for z/VM is first installed. However, we recommend that you do not activate command limiting until you store the command limiting rules.
To implement command limiting:
- Select CP commands for CA ACF2 for z/VM validation
- Ensure that the command models are activated and loaded in the Infostorage database
- Write initial command limiting rule sets
- Compile and store command limiting rule sets
- Set up command limiting validation
- Move the command limiting rule sets toward full security.
The following sections describe the first five tasks. The sixth task is described in the “Converting to Full Security” chapter.
Copyright © 2009 CA Technologies.
All rights reserved.
 
|
|