Support for your product in a single location.
New releases, updates and patches.
Maximize your investmentFind out how we can help
Our leaders' commentary on news inthe software industry. Read now
Where do you want to be?Search jobs
This technical brief is intended to outline methods used to evaluate current security against a desired ideal. It describes approaches used to assess what exposures may exist, against which levels of risk may be determined. It then explains how Privilege Manager for Unix functions, and describes some of the scripting constructs which can be employed. The document concludes with a simplistic worked example, together with some general guidelines which can be used to model real world rules.
©2013 Dell Inc. ALL RIGHTS RESERVED. Acquisitions - Enstratius, PacketTrap, RemoteScan