Re: Securing TSM Client

2010-05-17 Thread Allen S. Rout
>> On Tue, 11 May 2010 17:08:27 -0300, Leandro Mazur  
>> said:


> The problem that we have is that the sysadmins are doing backups/archives
> and restores/retrieves without our knowledge, with great impact on our
> database (among other things...).

Charge them for it, and charge them more if they're out of their window.

:)


- Allen S. Rout


Re: Securing TSM Client

2010-05-12 Thread Leandro Mazur
I've tested this optionit works well, but in cases where the schedule
calls a script, didn't worked because the client could not start the
session...

On Wed, May 12, 2010 at 12:32 PM, Shawn Drew <
shawn.d...@americas.bnpparibas.com> wrote:

> Intended for firewall security, the "sessioninitiation" property on the
> nodes may work for this.
> You will have to disable the setting if anyone actually wanted to do a
> manual backup or restore
> from the client side, but that's a quick "upd n"
>
> Only the TSM Server would be allowed to start client sessions.
>
> Regards,
> Shawn
> 
> Shawn Drew
>
>
>
>
>
> Internet
> leandroma...@gmail.com
>
> Sent by: ADSM-L@VM.MARIST.EDU
> 05/11/2010 04:08 PM
> Please respond to
> ADSM-L@VM.MARIST.EDU
>
>
> To
> ADSM-L
> cc
>
> Subject
> [ADSM-L] Securing TSM Client
>
>
>
>
>
>
> Hello everyone !
>
> I don't know if somebody has this kind of problem, but I have the
> following
> situation in the company I work for:
>
> - We have a TSM team to install, configure and maintain the whole backup
> process, server and client;
> - We have sysadmins that take care of the operational system and the
> applications;
> - When there's a need for any action to do with backup, they should open a
> ticket for the TSM team;
>
> The problem that we have is that the sysadmins are doing backups/archives
> and restores/retrieves without our knowledge, with great impact on our
> database (among other things...). We would like to block the access on the
> client, but we were not successful. If we use "password generate" on
> dsm.sys, the password is prompted only at first access. If we use
> "password
> prompt", the scheduler doesn't work (ANS2050E)...
> Any sugestions from the experts ? Maybe it could be a improvement to IBM
> implement on the future...
> __
> Leandro Mazur
>
>
>
> This message and any attachments (the "message") is intended solely for
> the addressees and is confidential. If you receive this message in error,
> please delete it and immediately notify the sender. Any use not in accord
> with its purpose, any dissemination or disclosure, either whole or partial,
> is prohibited except formal approval. The internet can not guarantee the
> integrity of this message. BNP PARIBAS (and its subsidiaries) shall (will)
> not therefore be liable for the message if modified. Please note that
> certain
> functions and services for BNP Paribas may be performed by BNP Paribas RCC,
> Inc.
>



--
__
Leandro Mazur


Re: Securing TSM Client

2010-05-12 Thread Shawn Drew
Intended for firewall security, the "sessioninitiation" property on the
nodes may work for this.
You will have to disable the setting if anyone actually wanted to do a
manual backup or restore
from the client side, but that's a quick "upd n"

Only the TSM Server would be allowed to start client sessions.

Regards,
Shawn

Shawn Drew





Internet
leandroma...@gmail.com

Sent by: ADSM-L@VM.MARIST.EDU
05/11/2010 04:08 PM
Please respond to
ADSM-L@VM.MARIST.EDU


To
ADSM-L
cc

Subject
[ADSM-L] Securing TSM Client






Hello everyone !

I don't know if somebody has this kind of problem, but I have the
following
situation in the company I work for:

- We have a TSM team to install, configure and maintain the whole backup
process, server and client;
- We have sysadmins that take care of the operational system and the
applications;
- When there's a need for any action to do with backup, they should open a
ticket for the TSM team;

The problem that we have is that the sysadmins are doing backups/archives
and restores/retrieves without our knowledge, with great impact on our
database (among other things...). We would like to block the access on the
client, but we were not successful. If we use "password generate" on
dsm.sys, the password is prompted only at first access. If we use
"password
prompt", the scheduler doesn't work (ANS2050E)...
Any sugestions from the experts ? Maybe it could be a improvement to IBM
implement on the future...
__
Leandro Mazur



This message and any attachments (the "message") is intended solely for
the addressees and is confidential. If you receive this message in error,
please delete it and immediately notify the sender. Any use not in accord
with its purpose, any dissemination or disclosure, either whole or partial,
is prohibited except formal approval. The internet can not guarantee the
integrity of this message. BNP PARIBAS (and its subsidiaries) shall (will)
not therefore be liable for the message if modified. Please note that certain
functions and services for BNP Paribas may be performed by BNP Paribas RCC, Inc.


Re: Securing TSM Client

2010-05-12 Thread Leandro Mazur
Humm...that's interesting...I'll take a look ! Thanks Richard !

On Wed, May 12, 2010 at 8:18 AM, Richard Sims  wrote:

> Leandro -
>
> The problem you're dealing with is a personnel management one, which can't
> be solved by technology alone.  The management there is the only avenue of
> solution.
>
> Technology can help, though.  You can harvest records from the dsmaccnt.log
> to compile a report to management demonstrating the times and data amounts
> that inappropriate people have been performing TSM actions on that client,
> by virtue of field 7 containing a username whenever dsmc is invoked by an
> individual.  You could go further by having a dsmadmc-based monitor
> performing Query SEssion Format=Detailed to look for sessions from that
> node: where the User Name is inappropriate, the monitor could then cancel
> the session and send a notification of the usage violation.
>
>Richard Simsat Boston University
>



--
__
Leandro Mazur


Re: Securing TSM Client

2010-05-12 Thread Richard Sims
Leandro -

The problem you're dealing with is a personnel management one, which can't be 
solved by technology alone.  The management there is the only avenue of 
solution.

Technology can help, though.  You can harvest records from the dsmaccnt.log to 
compile a report to management demonstrating the times and data amounts that 
inappropriate people have been performing TSM actions on that client, by virtue 
of field 7 containing a username whenever dsmc is invoked by an individual.  
You could go further by having a dsmadmc-based monitor performing Query SEssion 
Format=Detailed to look for sessions from that node: where the User Name is 
inappropriate, the monitor could then cancel the session and send a 
notification of the usage violation.

Richard Simsat Boston University


Re: Securing TSM Client

2010-05-11 Thread Leandro Mazur
Thanks for the answers !

About the sugestions:

- I can't lock the nodes during the day, because several backups run every
2, 4 and 6 hours;
- Lock the admin is a good sugetsion, although not possible...
- The admins have the administrator/root password, so they can do
anything...
- Is not the occasional backups that worries me...instead of using the tsm
client schedule, we just find out that they are using crontab/task scheduler
to do backups (a lot of them !). Our ticket response time is 1 hour at
mostFor 99% of the cases we have, it is more than acceptable;
- We are having a considerable growth of our data, which causes the impact
that I mentioned, but it is managable as long we don't have surprises like
that

It seems that the only thing I can do is convince the admins to not
do...anyway, thanks for the help !

On Tue, May 11, 2010 at 7:22 PM, Remco Post  wrote:

> On 11 mei 2010, at 22:08, Leandro Mazur wrote:
>
> > Hello everyone !
> >
> > I don't know if somebody has this kind of problem, but I have the
> following
> > situation in the company I work for:
> >
> > - We have a TSM team to install, configure and maintain the whole backup
> > process, server and client;
> > - We have sysadmins that take care of the operational system and the
> > applications;
> > - When there's a need for any action to do with backup, they should open
> a
> > ticket for the TSM team;
> >
> > The problem that we have is that the sysadmins are doing backups/archives
> > and restores/retrieves without our knowledge, with great impact on our
> > database (among other things...).
>
> if a system administrator running an occasional backup has _great_ impact
> on your database, you need to reconsider your TSM infrastructure. I'm
> assuming here that your system administrators have better things to do with
> their time than running backups all day, so when they do, there is an actual
> need for it.
>
> > We would like to block the access on the
> > client, but we were not successful. If we use "password generate" on
> > dsm.sys, the password is prompted only at first access. If we use
> "password
> > prompt", the scheduler doesn't work (ANS2050E)...
> > Any sugestions from the experts ? Maybe it could be a improvement to IBM
> > implement on the future...
>
> have you considered cattle prods? Except for Lindsay's suggestion of
> locking everything down during the day (disable sessions at 7:00, enable
> sessions at 18:00) there is no way. You may want to think about your
> procedures, since they probably do this because raising a ticket takes to
> long, and they need to get on with their work.
>
> > __
> > Leandro Mazur
>
> --
> Met vriendelijke groeten/Kind Regards,
>
> Remco Post
> r.p...@plcs.nl
> +31 6 248 21 622
>



--
__
Leandro Mazur


Re: Securing TSM Client

2010-05-11 Thread Remco Post
On 11 mei 2010, at 22:08, Leandro Mazur wrote:

> Hello everyone !
> 
> I don't know if somebody has this kind of problem, but I have the following
> situation in the company I work for:
> 
> - We have a TSM team to install, configure and maintain the whole backup
> process, server and client;
> - We have sysadmins that take care of the operational system and the
> applications;
> - When there's a need for any action to do with backup, they should open a
> ticket for the TSM team;
> 
> The problem that we have is that the sysadmins are doing backups/archives
> and restores/retrieves without our knowledge, with great impact on our
> database (among other things...).

if a system administrator running an occasional backup has _great_ impact on 
your database, you need to reconsider your TSM infrastructure. I'm assuming 
here that your system administrators have better things to do with their time 
than running backups all day, so when they do, there is an actual need for it.

> We would like to block the access on the
> client, but we were not successful. If we use "password generate" on
> dsm.sys, the password is prompted only at first access. If we use "password
> prompt", the scheduler doesn't work (ANS2050E)...
> Any sugestions from the experts ? Maybe it could be a improvement to IBM
> implement on the future...

have you considered cattle prods? Except for Lindsay's suggestion of locking 
everything down during the day (disable sessions at 7:00, enable sessions at 
18:00) there is no way. You may want to think about your procedures, since they 
probably do this because raising a ticket takes to long, and they need to get 
on with their work. 

> __
> Leandro Mazur

-- 
Met vriendelijke groeten/Kind Regards,

Remco Post
r.p...@plcs.nl
+31 6 248 21 622


Re: Securing TSM Client

2010-05-11 Thread Huebner,Andy,FORT WORTH,IT
When you install TSM, only grant execute access to the TSM team and the account 
the backup runs under.

Andy Huebner

-Original Message-
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu] On Behalf Of 
Leandro Mazur
Sent: Tuesday, May 11, 2010 3:08 PM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] Securing TSM Client

Hello everyone !

I don't know if somebody has this kind of problem, but I have the following
situation in the company I work for:

- We have a TSM team to install, configure and maintain the whole backup
process, server and client;
- We have sysadmins that take care of the operational system and the
applications;
- When there's a need for any action to do with backup, they should open a
ticket for the TSM team;

The problem that we have is that the sysadmins are doing backups/archives
and restores/retrieves without our knowledge, with great impact on our
database (among other things...). We would like to block the access on the
client, but we were not successful. If we use "password generate" on
dsm.sys, the password is prompted only at first access. If we use "password
prompt", the scheduler doesn't work (ANS2050E)...
Any sugestions from the experts ? Maybe it could be a improvement to IBM
implement on the future...
__
Leandro Mazur

This e-mail (including any attachments) is confidential and may be legally 
privileged. If you are not an intended recipient or an authorized 
representative of an intended recipient, you are prohibited from using, copying 
or distributing the information in this e-mail or its attachments. If you have 
received this e-mail in error, please notify the sender immediately by return 
e-mail and delete all copies of this message and any attachments.

Thank you.


Re: Securing TSM Client

2010-05-11 Thread Fred Johanson
Better to lock the admin.



-Original Message-
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu] On Behalf Of 
Lindsay Morris
Sent: Tuesday, May 11, 2010 3:59 PM
To: ADSM-L@vm.marist.edu
Subject: Re: [ADSM-L] Securing TSM Client

Maybe you could lock all the nodes during the day (LOCK NODE...),
and unlock them at night for your scheduled backups ... ?


Lindsay Morris
CEO, TSMworks
Tel. 1-859-539-9900
lind...@tsmworks.com


On Tue, May 11, 2010 at 4:08 PM, Leandro Mazur wrote:

> Hello everyone !
>
> I don't know if somebody has this kind of problem, but I have the following
> situation in the company I work for:
>
> - We have a TSM team to install, configure and maintain the whole backup
> process, server and client;
> - We have sysadmins that take care of the operational system and the
> applications;
> - When there's a need for any action to do with backup, they should open a
> ticket for the TSM team;
>
> The problem that we have is that the sysadmins are doing backups/archives
> and restores/retrieves without our knowledge, with great impact on our
> database (among other things...). We would like to block the access on the
> client, but we were not successful. If we use "password generate" on
> dsm.sys, the password is prompted only at first access. If we use "password
> prompt", the scheduler doesn't work (ANS2050E)...
> Any sugestions from the experts ? Maybe it could be a improvement to IBM
> implement on the future...
> __
> Leandro Mazur
>


Re: Securing TSM Client

2010-05-11 Thread Lindsay Morris
Maybe you could lock all the nodes during the day (LOCK NODE...),
and unlock them at night for your scheduled backups ... ?


Lindsay Morris
CEO, TSMworks
Tel. 1-859-539-9900
lind...@tsmworks.com


On Tue, May 11, 2010 at 4:08 PM, Leandro Mazur wrote:

> Hello everyone !
>
> I don't know if somebody has this kind of problem, but I have the following
> situation in the company I work for:
>
> - We have a TSM team to install, configure and maintain the whole backup
> process, server and client;
> - We have sysadmins that take care of the operational system and the
> applications;
> - When there's a need for any action to do with backup, they should open a
> ticket for the TSM team;
>
> The problem that we have is that the sysadmins are doing backups/archives
> and restores/retrieves without our knowledge, with great impact on our
> database (among other things...). We would like to block the access on the
> client, but we were not successful. If we use "password generate" on
> dsm.sys, the password is prompted only at first access. If we use "password
> prompt", the scheduler doesn't work (ANS2050E)...
> Any sugestions from the experts ? Maybe it could be a improvement to IBM
> implement on the future...
> __
> Leandro Mazur
>