=SSGSG7dc=D600uid=swg21384389
From:
Richard Rhodes rrho...@firstenergycorp.com
To:
ADSM-L@VM.MARIST.EDU
Date:
09/15/2009 09:06 AM
Subject:
[ADSM-L] TSM Security alerts - is there a list somewhere
Sent by:
ADSM: Dist Stor Manager ADSM-L@VM.MARIST.EDU
I'm being asked for a list of all TSM security
@VM.MARIST.EDU
Manager cc
ads...@vm.marist
.EDU Subject
Re: TSM Security alerts
I'm being asked for a list of all TSM security alerts/issues. I'm not
finding a list on the IBM support web page.
Is there a list of TSM security vulnerabilities anywhere?
We've got a case open with support, but thought to ask here also.
Rick
...@vm.marist.edu] On Behalf
Of Richard Rhodes
Sent: Tuesday, September 15, 2009 8:04 AM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] TSM Security alerts - is there a list somewhere
I'm being asked for a list of all TSM security alerts/issues. I'm not
finding a list on the IBM support web page
Have you look at this page:
http://www-01.ibm.com/support/docview.wss?rs=663context=SSGSG7dc=D600uid=swg21384389
From:
Richard Rhodes rrho...@firstenergycorp.com
To:
ADSM-L@VM.MARIST.EDU
Date:
09/15/2009 09:06 AM
Subject:
[ADSM-L] TSM Security alerts - is there a list somewhere
Sent by:
ADSM
Two TSM client security vulnerabilities have been discovered and reported
to us. Note that there are no known exploits. Please see
http://www.ibm.com/support/docview.wss?uid=swg21268775
for details, including information on the fixing code.
Or you can click on the link to the TSM support page
Subject: [ADSM-L] TSM security flash
Two TSM client security vulnerabilities have been discovered and
reported
to us. Note that there are no known exploits. Please see
http://www.ibm.com/support/docview.wss?uid=swg21268775
for details, including information on the fixing code.
Or you can click
Thank you for your reply Richard.
-Original Message-
From: Richard Sims [mailto:[EMAIL PROTECTED]
Sent: Monday, March 17, 2003 12:39 PM
To: [EMAIL PROTECTED]
Subject: Re: TSM Security
IT Security is getting on me to provide better security for TSM server, the
TSM Clients, the Tape
Hello folks,
IT Security is getting on me to provide better security for TSM server, the
TSM Clients, the Tape Library and, most importantly, the filespace. I
cannot find very much documentation on security other than ports used
through a firewall and passwordaccess generate options (I hear we
encrypt these). Is there a white paper out there or has someone went
through this already and can share what they found?
I don't know of a summary paper describing TSM security; but the manuals,
and particularly the Technical Guide redbooks, fully describe what's
available in the product. The product
Good Day,
I am not sure if TSM loads the complete ACSLS inventory. I don't think so
however. However, TSM will only work with tapes that are checked in an
labled by TSM. Therfore you do not need to worry about TSM overwriting
the other applications tapes. Also if STK works similar to IBM's
+49.172.432 24 63 mobile
Email: [EMAIL PROTECTED]
StorageTek
INFORMATION made POWERFUL
-Ursprüngliche Nachricht-
Von: Walker, Lesley R [mailto:[EMAIL PROTECTED]]
Gesendet am: Donnerstag, 21. Dezember 2000 06:49
An:
Betreff: TSM security - sharing STK library with other apps
Does anyone
ms/Dilbert
-Original Message-
From: Walker, Lesley R [SMTP:[EMAIL PROTECTED]]
Sent: Thursday, December 21, 2000 12:49 AM
To: [EMAIL PROTECTED]
Subject: TSM security - sharing STK library with other apps
Does anyone have
To: [EMAIL PROTECTED]
Subject: TSM security - sharing STK library with other apps
Does anyone have experience of using an ACSLS-controlled STK library and
sharing it with other applications?
Our customer is very concerned about the possibility of Application A being
able to read/overwrite tapes
We are currently using an STK 9740, shared between 3 ADSM servers and a Unitree
server.
We use separate pools for each server, and have implemented volume ownership,
all through ACSLS. This requires us to have scratch tapes in each pool.
Additionally, to make the tape easier to differentiate
Thanks for the replies everyone.
Oddly enough I hadn't thought of the possibility of the other app stomping
on TSM, that's what comes of being too busy I guess.
I think the other app is Netbackup, does anyone know how it might behave in
this context?
--
Lesley Walker
Distributed Systems
Does anyone have experience of using an ACSLS-controlled STK library and
sharing it with other applications?
Our customer is very concerned about the possibility of Application A being
able to read/overwrite tapes belonging to Application B, and the question
has been asked:
Most (all?) tape
17 matches
Mail list logo