Copyright Digital Equipment Corp. All rights reserved.

Examples

   1.$ DELETE/INTRUSION_RECORD TTC2:

     In this example, the DELETE/INTRUSION_RECORD command removes
     all intrusion records generated by break-in attempts on TTC2.
     No user name is specified because none of the login failures
     occurred for valid users.

   2.$ DELETE/INTRUSION_RECORD "AV34C2/LC-2-10":FORGETFUL

     In this example, the source of the break-in is a local terminal
     that is connected to a terminal server. To delete the record
     from the break-in database, you must enclose the terminal
     port name within quotation marks so that the operating system
     interprets the slash as a foreign character and not as a
     qualifier.

   3.$ DELETE/INTRUSION_RECORD NODE1::HAMMER

     This command removes all intrusion entries generated from node
     NODE1 for user HAMMER.

   4.$ DELETE/INTRUSION_RECORD/NODE=(CAPPY,INDI)
     $ SHOW INTRUSION
     NETWORK      SUSPECT       2  26-JUL-2001 08:51:25.66  BARNEY::HAMMER
         Node: TSAVO      Count:   2

     This command removes intrusion entries for the nodes CAPPY and
     INDI.

   5.$ DELETE/INTRUSION_RECORD/NODE=FOOBAR
     $ SHOW INTRUSION
     NETWORK      SUSPECT       2  26-JUL-2001 08:51:25.66  BARNEY::HAMMER
         Node: TSAVO      Count:   2

     This command removes intrusion entries for the node FOOBAR.

   6.$ DELETE/INTRUSION_RECORD/NODE=TSAVO
     $ SHOW INTRUSION
     %SHOW-F-NOINTRUDERS, no intrusion records match specification

     This command attempts to remove intrusion entries for node
     TSAVO, however there were no intrusion records for this node.