List of Figures

| Table of Contents | List of Figures | List of Tables |

Figure 1-1. License Advisory window
Figure 1-2. Online Help window
Figure 2-1. Session Preferences window
Figure 2-2. Alter Menu window
Figure 2-3. Network Pool Configuration window
Figure 2-4. Network Pool Add window
Figure 2-5. User Authorization Configuration window
Figure 2-6. Add User Authorization window
Figure 2-7. EMD Data Expiration Parameters window
Figure 2-8. About Enlighten window
Figure 3-1. Current User Accounts List
Figure 3-2. Create New User Account window
Figure 3-3. Creating Multiple New Users
Figure 3-4. Changing User Account Password
Figure 3-5. User Account Information
Figure 3-6. Query User Account Information window
Figure 3-7. Currently Configured User Groups
Figure 3-8. New User Group window
Figure 3-9. User Group List window
Figure 3-10. Logged in users
Figure 3-11. Active processes list
Figure 3-12. CPU Summary window
Figure 3-13. New User Template Configuration window
Figure 3-14. New User Template Add window
Figure 4-1. Configured Printers window
Figure 4-2. Add a New Print Service window
Figure 4-3. Add a New Print Service window
Figure 4-4. Add a New Print Service window
Figure 4-5. Printer Queue Status window
Figure 4-6. Create Custom Printer Model window
Figure 4-7. TTY Configuration window
Figure 4-8. Adding a TTY port
Figure 5-1. Host Entry Configuration window
Figure 5-2. Add Host Entry window
Figure 5-3. Import Host Entries File window
Figure 5-4. Network Host Configuration window
Figure 5-5. Host Naming Services Configuration window
Figure 5-6. Modify Host Naming Services window
Figure 5-7. Naming Services Overrides window
Figure 5-8. Create Naming Service Override window
Figure 5-9. Domain Name Servers window
Figure 5-10. Add Domain Name Server window
Figure 5-11. Add Domain Name Server window
Figure 5-12. Configuring mail exchange information
Figure 5-13. Add Mail Exchanger Host window
Figure 5-14. Configuring servers
Figure 5-15. Add NIS Server window
Figure 5-16. Add NIS server
Figure 5-17. Add NIS+ server
Figure 5-18. Delete NIS and NIS+ Servers
Figure 5-19. Mounted filesystems on hosts of the current pool
Figure 5-20. The NFS Partition window
Figure 5-21. Exportable directories
Figure 5-22. Export a Filesystem window
Figure 6-1. Security Report—Vital files
Figure 6-2. Security Report—Filesystem devices
Figure 6-3. Security Report—Boot and shutdown script checks
Figure 6-4. Security Report—Crontab contents
Figure 6-5. Security Report—Password file integrity
Figure 6-6. Security Report—Group file integrity
Figure 6-7. Security Report—User home directories
Figure 6-8. Security Report—Attempted break-ins
Figure 6-9. Password Check Parameters window
Figure 7-1. Disk Usage By Filesystem window
Figure 7-2. Select Disk Partitions window
Figure 7-3. Disk Usage Information by Users window
Figure 7-4. File Systems Detail window
Figure 7-5. Statistical File Summary
Figure 7-6. File Permissions
Figure 7-7. Select Disk Partitions window
Figure 7-8. Disk Usage Information By Group window
Figure 7-9. Currently mounted filesystems
Figure 7-10. File Search Query window
Figure 7-11. Select Disk Partitions window
Figure 7-12. Processes by Filesystem window
Figure 7-13. Currently mounted filesystems
Figure 7-14. Save Selected Disk Snapshots window
Figure 7-15. Currently mounted filesystems
Figure 7-16. Select Saved Snapshots window
Figure 7-17. User Files Changed
Figure 7-18. Changed Files
Figure 7-19. Search fields
Figure 7-20. List of Changed Files window
Figure 8-1. Archive Device Configuration window
Figure 8-2. Archive Device Add window
Figure 8-3. Tape Operations window
Figure 8-4. Backup Partitions window
Figure 8-5. Restore Files window
Figure 8-6. Backup Catalog Query window
Figure 8-7. List of matching files
Figure 8-8. Scheduled Backup Configuration window
Figure 8-9. Add Scheduled Backup window
Figure 8-10. Backup Logs Configuration window
Figure 9-1. Summary of Processes by TTY window
Figure 9-2. Swap Space Usage window
Figure 9-3. Shutting down and rebooting hosts
Figure 9-4. Status of pending shutdowns or reboots
Figure 9-5. Crontab Configuration window
Figure 9-6. Add Crontab Entry window
Figure 9-7. Finding cron jobs
Figure 9-8. Cron security status of hosts
Figure 9-9. Modify Crontab User Access window
Figure 9-10. Synchronizing a host clock
Figure 9-11. Setting up a synchronization process
Figure 9-12. Resetting a host clock
Figure 9-13. Configuring mail aliases
Figure 9-14. Creating a new mail alias
Figure 9-15. Mail alias summary
Figure 9-16. Finding mail aliases
Figure 9-17. Remote File Distribution Configuration window
Figure 9-18. Add Remote File Distribution Job window
Figure 9-19. Remote File Distribution Logs window
Figure 10-1. Events Configuration window
Figure 10-2. Status Map window
Figure 10-3. Host Overview window
Figure 10-4. Host Overview-Host Notes window
Figure 10-5. Query Events Messages window
Figure 10-6. New Event Messages
Figure A-1. Evaluate window