Securing Attachments: Process Overview

The process for securing attachments involves the following general steps:

  • If necessary, locate the data file that is associated with the attachment file.

    If you already know which data file contains the attachments, you do not need to do this and can proceed with writing a rule on the attachment.

    If you need to locate the data file:

    • Use the Security Administrator to view the data files used in the application.

    • Run a utility (lstprodatch) to show you all data files in the data area that contain attachments. This will also tell you the naming scheme for the attachment file.

    • Compare the list of files you located through the Security Administrator with the list that the lstprodatch utility produced. The file that appears in both lists is the attachment data file.

  • Write a rule on the attachment.