Solved

Solaris Setting and Security

Posted on 2011-02-23
4
460 Views
Last Modified: 2012-08-14
In Solaris,
1. What is the location of the default password file and shadow password file?
2. How to know whether Solaris has enabled the ScreenSaver lock with the password protection enabled? and the timeout period? And the configuration files location?
3. How to get all the audit log configuration files and the permission of each?
4. How to know whether failed login are logged? And where is the log file?
5. How to know whether system logging daemon is enabled?

Hope if anyone can help! Thank you very much!
0
Comment
Question by:mawingho
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 34966789
Is this an Assignment?

usually configuraion files on a unix/linux system are in /etc/
0
 

Author Comment

by:mawingho
ID: 34966803
I am new to my job and I am not faimilar in Solaris.
hope if you can help each of the question.
will be very appreciated
0
 
LVL 78

Assisted Solution

by:arnold
arnold earned 500 total points
ID: 34966853
Are you familiar with Linux or other Unix environments?
Which Solaris version are you dealing with?
Configuration files usually are in /etc
Screen saver settings are part of a graphical environment and are likely in /etc/X11.

I'd suggest that you look through the system.

/sbin/ifconfig -a (network interface information)
netstat -rn  (routing table)

syslog is often the handler for the notifications and its configuration is /etc/syslog.conf there you can see the files and which applications log to them.
/etc/ssh/sshd_config deals with ssh server settings.
0
 

Author Closing Comment

by:mawingho
ID: 34977002
thanks
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Certificate Request CentOS/Apache 1 56
remote desktop user rights 5 95
Linux Server mapping drive using SSH key 9 48
Better malware protection 9 48
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.
Suggested Courses

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question