|
Hi guys
I am talking to someone about exit point monitoring to further lock
down their box. The situation is they have a green screen application
that expects users to operate with elevated rights. At the same time
they recognise that there is a potential risk when those users are
using other tools (ODBC, FTP, Access, Excel, etc) to access the
database directly.
I understand that I can do things like make a users access read only
when the access is requested for example via an ODBC connection, but
my question is how granular the monitoring capability is. For example,
can I manage requests for the Excel plug-in and ODBC access separately
? What about the Excel Plug in vs OLE-DB ?
I guess I just want to understand how granular the access control can
be using the exit points and a security product.
Vendors, if appropriate, feel free to email me directly, with
information about the kind of access control your product provides, or
just point me at a page with the relevant detail.
--
Regards
Evan Harris
http://www.auctionitis.co.nz
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.