Novell Privileged User Manager v2.2
Evaluation Quick Start Guide
Page 2
Table of Contents
1.0 CONCEPTS AND OVERVIEW ......................................................................................................................... 3
1.1 PREREQUISITES............................................................................................................................................................3
1.2 OBTAINING EVALUATION INSTALLER............................................................................................................................3
1.3 IMPORTANT INFORMATION –PLEASE READ BEFORE YOU START ..............................................................................4
2.1 INSTALL STD MANAGER PACKAGE...............................................................................................................................5
2.1.1 AIX MANAGER INSTALL ....................................................................................................................................................5
2.1.2 HP-UX FRAMEWORK MANAGER INSTALL.............................................................................................................................6
2.1.3 LINUX FRAMEWORK MANAGER INSTALL...............................................................................................................................7
2.1.4 SOLARIS FRAMEWORK MANAGER INSTALL............................................................................................................................8
2.1.5 TRU64 FRAMEWORK MANAGER INSTALL .............................................................................................................................9
2.1.6 WINDOWS FRAMEWORK MANAGER INSTALL ......................................................................................................................10
2.2 LOG ON AND SET ADMINISTRATOR PASSWORD.........................................................................................................11
2.3 LOAD AND INSTALL EVALUATION DATABASES............................................................................................................12
2.3.1 LOAD EVALUATION INSTALLER..........................................................................................................................................12
2.3.2 INSTALL EVALUATION DATABASES TO HOST ........................................................................................................................12
3.0 INITIAL ORIENTATION................................................................................................................................... 14
LOG ON TO THE NOVELL PRIVILEGED USER MANAGER ADMINISTRATION CONSOLE.......................................................14
CHANGE PASSWORD.........................................................................................................................................................14
ORIENTATION:HOME MENU .............................................................................................................................................15
ORIENTATION:COMPLIANCE AUDITOR.............................................................................................................................16
ORIENTATION:REPORTING...............................................................................................................................................17
ORIENTATION:HOSTS.......................................................................................................................................................18
ORIENTATION:PACKAGE MANAGER.................................................................................................................................19
ORIENTATION:COMMAND CONTROL................................................................................................................................20
ORIENTATION:MANAGE USERS .......................................................................................................................................21
4.0 STEP BY STEP EXERCISES......................................................................................................................... 22
REVIEWING KEYSTROKE ACTIVITY PROACTIVELY .............................................................................................................22
REVIEWING KEYSTROKE ACTIVITY FORENSICALLY ...........................................................................................................27
USE COMMAND CONTROL TO ACCESS A PRIVILEGED SHELL...........................................................................................31
REVIEW NOVELL PRIVILEGED USER MANAGER SYSTEM LOGS........................................................................................32
DOWNLOAD NOVELL UPDATES AND DEPLOY TO YOUR HOST...........................................................................................33