The requested article is not available. Either it doesn't apply to this version of the product or the relevant information is organized differently in this version of the docs. You can search, browse, or go back to the other version.
Types of access checks security traces monitor
-
PDF of this doc site
-
Cluster administration
-
Volume administration
-
Logical storage management with the CLI
-
-
NAS storage management
-
Configure NFS with the CLI
-
Manage NFS with the CLI
-
Manage SMB with the CLI
-
Manage file access using SMB
-
-
-
Security and data encryption
-
Data protection and disaster recovery
-

Collection of separate PDF docs
Creating your file...
This may take a few minutes. Thanks for your patience.
Your file is ready
Access checks for a file or folder are done based on multiple criteria. Security traces monitor operations on all these criteria.
The types of access checks that security traces monitor include the following:
-
Volume and qtree security style
-
Effective security of the file system containing the files and folders on which operations are requested
-
User mapping
-
Share-level permissions
-
Export-level permissions
-
File-level permissions
-
Storage-Level Access Guard security