  Network Configuration Security Auditing? 
 The Question is:
 
How to audit the TCPIP configuration change under tcpip(UCX) prompt.
 
 The Answer is :
 
  Security alarms or security audits on the database files, most
  commonly, though you will also want to review the mechanisms used
  for protecting these and other critical components -- privileges.
  If you have an untrusted privileged user, then you have absolutely
  no security.
 
  Please upgrade to TCP/IP Services V5.0A with ECO or (better) V5.1
  with ECO, or later (as available).  Please upgrade off of V5.0.
 
 Answer written or last revised on  15-JAN-2002 
