Adding the Initial Rule Set

In this section you will learn how to add user rules that tell Exit Point Manager to reject access to a server for a specific user, or for all users. You will also learn how to manage service profiles that require access, but do not need to be audited.

Blocking Unused Servers

When you are confident that a server is not being used, you can create a rule to block any possible access. For the following example, we will assume the *FTPREXEC server is not being used and should be blocked.

Managing Service Profile Activity

In the previous section (Discovery, Data Collection, and Analysis) we learned that PLCM2ADM is an automated service profile that requires access to the system, but does not need to be audited. Its transaction history produces unnecessary data that can be inconvenient to sift through while analyzing reports. Therefore, we can add a rule that grants it access to the server it requires (*DATAQSRV), with auditing turned off.

If the *PUBLIC rule for this server is set to *REJECT, all access attempts will be rejected. But, since this new rule is more specific, it is evaluated first, allowing PLCM2ADM access while restricting all other users. With this configuration, all access requests will be rejected, except for those originating from the user PLCM2ADM. See Active Rule and Rule Derivation for an explanation of Exit Point Manager’s rule hierarchy.