Hi guys

I am talking to someone about exit point monitoring to further lock
down their box. The situation is they have a green screen application
that expects users to operate with elevated rights. At the same time
they recognise that there is a potential risk when those users are
using other tools (ODBC, FTP, Access, Excel, etc) to access the
database directly.

I understand that I can do things like make a users access read only
when the access is requested for example via an ODBC connection, but
my question is how granular the monitoring capability is. For example,
can I manage requests for the Excel plug-in and ODBC access separately
? What about the Excel Plug in vs OLE-DB ?

I guess I just want to understand how granular the access control can
be using the exit points and a security product.

Vendors, if appropriate, feel free to email me directly, with
information about the kind of access control your product provides, or
just point me at a page with the relevant detail.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.