Adding the Initial Rule Set
In this section you will learn how to add user rules that tell Exit Point Manager to reject access to a server for a specific user, or for all users. You will also learn how to manage service profiles that require access, but do not need to be audited.
Blocking Unused Servers
When you are confident that a server is not being used, you can create a rule to block any possible access. For the following example, we will assume the *FTPREXEC server is not being used and should be blocked.
- On the Rules screen, click the *PUBLIC rule for the *FTPREXEC server.
- Choose Lookup to the right of the Authority field.
- Choose *REJECT.
- Ensure Audit is set to Yes.
NOTE: Whenever a reject rule is put in place it is highly recommended the Audit flag remains set to Yes. In the future, it may be useful to run an audit report showing any rejected access attempts against servers you have blocked. (If you are creating a new rule, set Messages to “Yes” in order to immediately submit a message upon any access attempts that are rejected.)
-
Choose Save. The *FTPREXEC server has been blocked for all users.
This rule blocks access to all functions of the *FTPREXEC server for all users.
- From the Main Menu, choose option 2, Work with Security by User.
- Next to the *FTPREXEC server *PUBLIC (default) user rule, enter 2.
- Change the Authority column from *OS400 to *REJECT. (Alternatively, to block a server for a particular user, you would create a new rule, indicating *ALL for Function, the user’s ID for User, and *REJECT for Authority.)
NOTE: Consider using a message management tool to help alert you of any reject messages.
- Ensure Audit is set to Y.
NOTE: Whenever a reject rule is put in place it is highly recommended the Audit flag remains set to Y. In the future, it may be useful to run an audit report showing any rejected access attempts against servers you have blocked. (If you are creating a new rule, set Message to “Y” in order to immediately submit a message upon any access attempts that are rejected. Set Switch Profile to *NONE).
- Press Enter. The *FTPREXEC server has been blocked for all users.
- When the server cache is cleared this rule will take effect. For the rule to be effective immediately, clear the server cache manually. To do so, turn rule enforcement off an on again as follows:
- In Work with Security by Server, enter SP for the server (in this case, *FTPREXEC).
- Change Exit Point Manager Rules Enforced to N and press Enter.
- Turn the rule enforcement back on - change Exit Point Manager Rules Enforced to Y and press Enter.
Managing Service Profile Activity
In the previous section (Discovery, Data Collection, and Analysis) we learned that PLCM2ADM is an automated service profile that requires access to the system, but does not need to be audited. Its transaction history produces unnecessary data that can be inconvenient to sift through while analyzing reports. Therefore, we can add a rule that grants it access to the server it requires (*DATAQSRV), with auditing turned off.
- On the Rules screen, choose Add.
Select the following values:
- Rule Type = User/User Group
- User/User Group=PLCM2ADM (the service profile account ID)
- Server > Function=*DATAQSRV and *ALL (this rule applies to all server functions)
- Authority=*OS400 (uses the authorities granted by the system)
- Audit=No (do not audit)
- Message=Inherit (inherit global system value)
- Capture=Inherit (inherit global system value)
- Choose Save to create the rule.
- From the Main Menu, choose 1, Work with Security by Server.
- Type UA next to the server used by the service profile (in this case *DATAQSRV) and press Enter.
- Enter 3 to copy the *PUBLIC rule.
- Enter the following values:
- User Rule Type=U for an individual user (you would choose G for a User Group).
- User=PLCM2ADM (the service profile account ID)
- Server=*DATAQSRV (the chosen server)
- Function=*ALL (this rule applies to all server functions - alternatively, you could enter a specific function)
- Authority=*OS400 (uses the authorities granted by the system)
- Switch Profile=*NONE (do not switch user profiles)
- Audit=N (do not audit)
- Message=* (inherit global system value (default=N))
- Capture=* (inherit global system value (default=N))
- Press Enter to create the rule.
If the *PUBLIC rule for this server is set to *REJECT, all access attempts will be rejected. But, since this new rule is more specific, it is evaluated first, allowing PLCM2ADM access while restricting all other users. With this configuration, all access requests will be rejected, except for those originating from the user PLCM2ADM.