Assuming you are working in an X Windows environment, invoke CA Access Control, verify that it is correctly installed on your system, and perform the following steps to initiate important protection:
seload
Wait while the seload command starts three CA Access Control daemons: Engine, Agent, and Watchdog.
secons -t+ -tv
CA Access Control accumulates a file of messages reporting operating system events. The secons ‑tv command displays the messages on the screen as well.
who
Watch the second window, where CA Access Control is writing the trace messages, to see whether CA Access Control intercepts the execution of the who command and reports on it. CA Access Control is correctly installed on your system if it reports interception of the who command.
The database does not yet contain any rules for blocking access attempts. Nevertheless, CA Access Control monitors the system so that you can see how the system behaves with CA Access Control installed and running, and which events CA Access Control intercepts.
secons -s
The following message displays on the screen:
CA Access Control is now DOWN !
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |