Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Overview
To prevent an attacker from viewing the user credential information that might be stored in trace files or network monitoring files, you should:
Confirm that only authorized users are allowed to run the SNA TRACE or Microsoft Network Monitoring programs on the computer that is running Transaction Integrator.
Store all tracing (Tracebits) output files and network monitoring (Netmon) output files in a secure directory.
Confirm that the access permissions are set correctly on all tracing output files and network monitoring output files.
Confirm that the access permissions are set correctly on the directory that contains the output files.
Delete all tracing output files and network monitoring output files as soon as you are done with them.
See Also
Protecting the TI .NET Assembly from Unauthorized Access
Protecting the TI Record or Playback Files from Unauthorized Access