Solved

Solaris Setting and Security

Posted on 2011-02-23
4
457 Views
Last Modified: 2012-08-14
In Solaris,
1. What is the location of the default password file and shadow password file?
2. How to know whether Solaris has enabled the ScreenSaver lock with the password protection enabled? and the timeout period? And the configuration files location?
3. How to get all the audit log configuration files and the permission of each?
4. How to know whether failed login are logged? And where is the log file?
5. How to know whether system logging daemon is enabled?

Hope if anyone can help! Thank you very much!
0
Comment
Question by:mawingho
  • 2
  • 2
4 Comments
 
LVL 77

Accepted Solution

by:
arnold earned 500 total points
ID: 34966789
Is this an Assignment?

usually configuraion files on a unix/linux system are in /etc/
0
 

Author Comment

by:mawingho
ID: 34966803
I am new to my job and I am not faimilar in Solaris.
hope if you can help each of the question.
will be very appreciated
0
 
LVL 77

Assisted Solution

by:arnold
arnold earned 500 total points
ID: 34966853
Are you familiar with Linux or other Unix environments?
Which Solaris version are you dealing with?
Configuration files usually are in /etc
Screen saver settings are part of a graphical environment and are likely in /etc/X11.

I'd suggest that you look through the system.

/sbin/ifconfig -a (network interface information)
netstat -rn  (routing table)

syslog is often the handler for the notifications and its configuration is /etc/syslog.conf there you can see the files and which applications log to them.
/etc/ssh/sshd_config deals with ssh server settings.
0
 

Author Closing Comment

by:mawingho
ID: 34977002
thanks
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IT Security & information risks with using Altova toolkits 11 109
Martian Packets Unix 5 50
is this a virus? 3 39
Strange proxy setting on slower than usual laptop 8 24
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Google Drive is extremely cheap offsite storage, and it's even possible to get extra storage for free for two years.  You can use the free account 15GB, and if you have an Android device..when you install Google Drive for the first time it will give…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question