Technical data

SCBs (storage control blocks)
in storage bitmap file, Vo l 2 , A–8
Scheduling, Vo l 1, 7–2, 7–33
See also Priority, job scheduling
batch jobs, Vo l 1 , 14–35
print jobs, Vo l 1 , 14–35
Scheduling priority
for a batch or print job
changing, Vo l 1, 14–35
SCROLL command, Vo l 2 , 22–13
SCROLL keypad function, Vo l 2 , 22–7
SCSI (Small Computer Systems Interface), Vo l 1,
11–43
SCSNODE system parameter, Vo l 2 , 25–11
in DECnet-Plus networks, Vo l 2 , 27–4
SDA (System Dump Analyzer utility)
See System Dump Analyzer utility
SDA CLUE
dump off system disk, Vol 2 , 16–20
SDA CLUE commands
analyzing the system dump file, Vo l 2, 16–2
saving contents of system dump file, Vo l 2 ,
16–22
using to archive dump file information, Vo l 2,
16–19
using to collect dump file information, Vo l 2,
16–19
Search lists
priority of installed images, Vo l 2, 17–9
Search path of Help Message database files, Vo l 1 ,
5–28
Secondary Bootstrap image
role in boot process, Vo l 1 , 4–2
SECONDARY day
defining for accounts, Vo l 1 , 7–28
Secondary page and swap files
See Page files; Swap files
installing during system startup, Vo l 1 , 5–6
Secondary processors, Vo l 2 , 28–2
Sections
global, Vo l 2 , 17–12
pages, Vo l 2, 17–12
Sectors
Files–11
definition, Vo l 2 , A–2
Security
See also Protection; Security auditing; Security
audit log files
alarm messages, Vo l 2 , 20–22
alarms
enabling, Vo l 2, 20–30
enabling operator terminals, Vo l 2 , 20–22
messages in operator log file, Vo l 2, 20–22
OPCOM alarm messages, Vo l 2 , 20–22
OpenVMS Cluster, Vo l 2 , 22–16
password management, Vo l 1 , 12–2
protected subsystems, Vo l 1 , 9–36
Security (cont’d)
protecting public disk volumes, Vo l 1 , 9–22
protecting queues, Vo l 1 , 14–23
protecting the system dump file, Vo l 2, 16–5
risk of compromise by installing images with
privileges, Vo l 2, 17–13
specifying alarm events, Vo l 2 , 20–22
SECURITY.AUDIT$JOURNAL file
See Security audit log files
SECURITY.SYS file
See Volume security profile
Security auditing, Vo l 1 , 12–2, 12–13
archive file for each node in a cluster, Vo l 2 ,
20–28
defining log file in system startup, Vo l 1 , 5–10
description, Vo l 2, 20–26, 20–27
disabling events, Vo l 2 , 20–29
displaying using SHOW AUDIT command, Vo l
2, 20–28
enabling operator terminal, Vo l 2 , 20–30
Security audit log files
closing, Vo l 2, 20–31
creating new version, Vo l 2 , 20–31
definition, Vo l 2, 20–2
reviewing, Vo l 2, 20–27
Security management, Vo l 1 , 7–16
in SYSMAN on remote nodes, Vo l 1, 2–16
protecting queues, Vo l 1 , 14–23 to 14–26
Security operator terminals, Vo l 2 , 20–30
Security server (SECURITY_SERVER)
starting, Vo l 1, 5–5
Security Server process
intrusion database, Vo l 1 , 12–7
network proxy database, Vo l 1 , 12–7
SECURITY_AUDIT.AUDIT$JOURNAL file
moving to reduce system disk I/O, Vo l 2 , 17–7
SELECT command
in SHOW CLUSTER, Vo l 2 , 22–13
Selective system dump, Vo l 2 , 16–4
compared to physical dump, Vo l 2 , 16–4, 16–12
order information is written in, Vo l 2, 16–13
storing, Vo l 2, 16–12
using to reduce size, Vo l 2, 16–12
SEQ (file sequence number)
See File identification, file sequence number
Sequential-disk save set, Vo l 1 , 11–9
initializing, Vo l 1, 11–9
mounting, Vo l 1, 11–9
Server MIB
defined, Vo l 2 , C–1
setting up, Vo l 2 , C–10
subagent objects, Vo l 2 , C–2
subagents, Vo l 2, C–1
Server queues, Vo l 1 , 14–3
Server queue status, Vo l 1 , 14–57
Index47