白皮书
了解如何解决权限管理矛盾,即权限最高的账户,其控制和保护程度最低。
马上阅读 »

Privilege Manager for Unix

Securely manage and control Unix root access

Privilege Manager for Unix, now a part of the Privileged Access Suite for Unix, enhances security by protecting the full power of root access from potential misuse or abuse through fine-grained, policy-based control.

Privilege Manager helps you define a security policy that stipulates who has access to which root function, as well as when and where individuals can perform those functions. It controls access to existing programs as well as any purpose-built utility used for common system administration tasks. 借助Privilege Manager,您再也不必担心他人无意或恶意地删除重要文件、修改文件权限或数据库、重新格式化磁盘或以更狡猾的手段破坏Unix系统。

由于Privilege Manager for Unix可让管理员精确制定安全策略、分配常见管理任务并记录所有Unix根目录活动,甚至可详细到按键记录,因此它能够降低安全风险提高IT工作效率,并帮助企业以经济有效的方式达到并保持合规性要求。

功能

  • 根目录的安全分区——Privilege Manager可帮您划分系统管理任务,而不会让根目录账户的安全性受到任何影响。 您可以制定一套详尽的规则,用于决定是否以及何时接受和拒绝用户请求。 该功能可以确保用户仅执行自己负责或被授权的根目录操作。
  • 无法消除的审核跟踪——Privilege Manager可记录使用高级访问权限执行的一切活动,必要时甚至可详细到按键记录。 这种可准确记录受控环境中根目录和其他账户活动的能力,为安全的系统管理策略提供了一种无法消除的审核跟踪功能。

  • 加密、身份验证和程序控制——Privilege Managerfor Unix可对其网络通信流量进行加密,以防他人未经授权而访问高度敏感的信息。 通过限制未经授权的或破坏性的程序以及在Unix系统上维护、存储或执行的数据,进一步增强安全性。
  • 异构网络的集中管理——Privilege Manager for Unix使用统一的单个管理界面进行配置和管理,可为异构型企业提供所需的全部功能。
  • 强大的多平台支持——Privilege Manager for Unix 支持多种Unix和Linux平台,包括IBM AIX、HP-UX、Sun、SuSE Linux、RedHat Linux、Tru64、SGI等。

系统要求

System Requirements:

Before installing Privilege Manager for UNIX 6.0, ensure your system meets the following minimum hardware and software requirements:

Operating System

Supported Version

Linux

Red Hat®

Enterprise Linux 5 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)
Enterprise Linux 6 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)

CentOS

CentOS 5 and 6 (Intel x86/x86 64)

Fedora

16,17, and 18 (Intel x86/x86 64)

SUSE® Linux

OpenSUSE 10 and 11 (Intel x86/x86 64)
Enterprise Desktop 10 and 11 (Intel x86/x86 64)
Enterprise Server 10 and 11 (Intel x86/x86 64, PowerPC 32/64 bit, IBM zSeries)

Debian/Ubuntu

Debian GNU/Linux 6 (Intel x86/x86 64)
Ubuntu 10.04 LTS, 11.10, 12.04, 12.10 (Intel x86/x86 64)

Oracle Linux

Oracle Linux 5 and 6 (Intel x86/x86 64)

Oracle VM

Oracle VM 2

XenServer

XenServer 5.6 and 6.0

VMware ESX Server

vSphere (ESX 4.0 and 4.1)

Solaris

Sun® Solaris

8, 9, 10, 11 11/11, and 11.1 (SPARC 32/64 bit / Intel x86/x86 64)

HP-UX

HP® HP-UX

11.11, 11.23, 11.31 (PA-RISC 32/64 bit)
11.22, 11.23, 11.31 (IA64 32/64 bit)

AIX

IBM® AIX

5.3, 6.1, and 7.1 (32/64 bit)

Language Supported:

  • US English

视频

  • Auditing and Keystroke Logging

    Compliance and security best practices demand accountability for actions taken with elevated privilege accounts (such as Administrator, root, and others). This White Board session presents easily implemented and powerfully thorough opportunities to implement the complete audit capabilities required to prove compliance.

    Watch the white board session »

  • Securing Access to Critical Web Resources

    The Unix root account (and many other administrative accounts) do not natively provide the ability to delegate responsibilities and access rights on a granular level. This White Board session shows how the Quest One Identity Solution adds the granularity and control required to truly improve security and achieve compliance for administrative accounts.

    Watch the white board session »

  • Privileged Account Management White Board

    Learn how to address challenges associated with superuser accounts with Quest One Identity Solutions - the industry’s only comprehensive collection of privileged account solutions.

    Watch the white board session »