Previous Topic: Why Does UNIX Need Protecting?Next Topic: What Is Protected?


How Does This Work?

In addition to supplying the regular security functions such as an access rule database, an audit log, and administration tools, CA ControlMinder intercepts the operating system events that are to be protected. Since CA ControlMinder has to work with many different operating systems, it intercepts events in memory. No changes are made to system files, and the operating system is not modified.