?
Solved

Solaris Setting and Security

Posted on 2011-02-23
4
Medium Priority
?
463 Views
Last Modified: 2012-08-14
In Solaris,
1. What is the location of the default password file and shadow password file?
2. How to know whether Solaris has enabled the ScreenSaver lock with the password protection enabled? and the timeout period? And the configuration files location?
3. How to get all the audit log configuration files and the permission of each?
4. How to know whether failed login are logged? And where is the log file?
5. How to know whether system logging daemon is enabled?

Hope if anyone can help! Thank you very much!
0
Comment
Question by:mawingho
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 79

Accepted Solution

by:
arnold earned 2000 total points
ID: 34966789
Is this an Assignment?

usually configuraion files on a unix/linux system are in /etc/
0
 

Author Comment

by:mawingho
ID: 34966803
I am new to my job and I am not faimilar in Solaris.
hope if you can help each of the question.
will be very appreciated
0
 
LVL 79

Assisted Solution

by:arnold
arnold earned 2000 total points
ID: 34966853
Are you familiar with Linux or other Unix environments?
Which Solaris version are you dealing with?
Configuration files usually are in /etc
Screen saver settings are part of a graphical environment and are likely in /etc/X11.

I'd suggest that you look through the system.

/sbin/ifconfig -a (network interface information)
netstat -rn  (routing table)

syslog is often the handler for the notifications and its configuration is /etc/syslog.conf there you can see the files and which applications log to them.
/etc/ssh/sshd_config deals with ssh server settings.
0
 

Author Closing Comment

by:mawingho
ID: 34977002
thanks
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Suggested Courses
Course of the Month9 days, 4 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question