CA Access Control allows you to define programs as trusted. CA Access Control stores the trusted programs and their children programs in a table. All events (inbound and outbound) related to trusted processes (and their corresponding ports) are permitted without authorization as part of a full network bypass.
To specify these programs, use the SPECIALPGM class:
CA Access Control ignores a process that has the PGMTYPE(fullbypass) property, and no record of any process events appears in CA Access Control audit, trace, or debug logs.
Note: Security privilege propagation works with PBF, PBN, DCM, FULLBYPASS, and SURROGATE privileges only.
| Copyright © 2012 CA. All rights reserved. |
|