Solved

Solaris Setting and Security

Posted on 2011-02-23
4
459 Views
Last Modified: 2012-08-14
In Solaris,
1. What is the location of the default password file and shadow password file?
2. How to know whether Solaris has enabled the ScreenSaver lock with the password protection enabled? and the timeout period? And the configuration files location?
3. How to get all the audit log configuration files and the permission of each?
4. How to know whether failed login are logged? And where is the log file?
5. How to know whether system logging daemon is enabled?

Hope if anyone can help! Thank you very much!
0
Comment
Question by:mawingho
  • 2
  • 2
4 Comments
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 34966789
Is this an Assignment?

usually configuraion files on a unix/linux system are in /etc/
0
 

Author Comment

by:mawingho
ID: 34966803
I am new to my job and I am not faimilar in Solaris.
hope if you can help each of the question.
will be very appreciated
0
 
LVL 78

Assisted Solution

by:arnold
arnold earned 500 total points
ID: 34966853
Are you familiar with Linux or other Unix environments?
Which Solaris version are you dealing with?
Configuration files usually are in /etc
Screen saver settings are part of a graphical environment and are likely in /etc/X11.

I'd suggest that you look through the system.

/sbin/ifconfig -a (network interface information)
netstat -rn  (routing table)

syslog is often the handler for the notifications and its configuration is /etc/syslog.conf there you can see the files and which applications log to them.
/etc/ssh/sshd_config deals with ssh server settings.
0
 

Author Closing Comment

by:mawingho
ID: 34977002
thanks
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Non admin needs to install programs 17 94
Scan Mac for security breach? 5 80
Moving from Mcrypt to OpenSSL 18 63
Enable SPF on IMSVA 6 13
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Google Drive is extremely cheap offsite storage, and it's even possible to get extra storage for free for two years.  You can use the free account 15GB, and if you have an Android device..when you install Google Drive for the first time it will give…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question