HP-UX Host Intrusion Detection System Version 4.1 Administrator's Guide

3. To apply the new value immediately, enter the following command:
# ndd -c /etc/rc.config.d/nddconf
To verify that the new value is active, use the ndd -get command as described
in Step 1.
Restricting Permissions
HP-UX HIDS files and programs are delivered with the strictest usable permissions.
Only user ids is allowed any access, and the superuser (root) is not permitted to
execute the programs. In addition, most files must be owned by user ids or HP-UX
HIDS cannot run.
Table 2-2 lists the proper runtime permissions.
Table 2-2 Runtime File Permissions
PermissionsFiles
u=rw (octal value 600)Configuration files in /etc/opt/ids
u=rw (octal value 600)Data files in /var/opt/ids
u=rx (octal value 500)Program and other files in /opt/ids
u=rwx (octal value 700)Directories, such as/var/opt/ids
50 Configuring HP-UX HIDS