Solved

Solaris Setting and Security

Posted on 2011-02-23
4
462 Views
Last Modified: 2012-08-14
In Solaris,
1. What is the location of the default password file and shadow password file?
2. How to know whether Solaris has enabled the ScreenSaver lock with the password protection enabled? and the timeout period? And the configuration files location?
3. How to get all the audit log configuration files and the permission of each?
4. How to know whether failed login are logged? And where is the log file?
5. How to know whether system logging daemon is enabled?

Hope if anyone can help! Thank you very much!
0
Comment
Question by:mawingho
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 34966789
Is this an Assignment?

usually configuraion files on a unix/linux system are in /etc/
0
 

Author Comment

by:mawingho
ID: 34966803
I am new to my job and I am not faimilar in Solaris.
hope if you can help each of the question.
will be very appreciated
0
 
LVL 78

Assisted Solution

by:arnold
arnold earned 500 total points
ID: 34966853
Are you familiar with Linux or other Unix environments?
Which Solaris version are you dealing with?
Configuration files usually are in /etc
Screen saver settings are part of a graphical environment and are likely in /etc/X11.

I'd suggest that you look through the system.

/sbin/ifconfig -a (network interface information)
netstat -rn  (routing table)

syslog is often the handler for the notifications and its configuration is /etc/syslog.conf there you can see the files and which applications log to them.
/etc/ssh/sshd_config deals with ssh server settings.
0
 

Author Closing Comment

by:mawingho
ID: 34977002
thanks
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
In the first part of this tutorial we will cover the prerequisites for installing SQL Server vNext on Linux.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to moveā€¦
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question