05-08-2008
For the first question : use who or finger and you'll see who's logged. For the second - how is the access policy organized - controlled by which application or audit control in your case ? We can't be aware of the policy your organization is using or have applied on your servers.
7 More Discussions You Might Find Interesting
1. Linux
Hi,
I want to know the command for finding out the list of active/disabled users in Linux System.
Model:x86_64. Rev:2.6.9
Thanks in advance for your help
Mike (1 Reply)
Discussion started by: Mike1234
1 Replies
2. AIX
Hi all,
I am new to HACMP. So sorry for the newie question. But I did search the forum and it seems that no one asks this before.
So if a 2-node cluster runs in active-active mode (and the same application), what is the benefit of using HACMP ?
If it runs in active-stanby, it is easy to... (9 Replies)
Discussion started by: qiulang
9 Replies
3. UNIX for Dummies Questions & Answers
Hello,
I've configured an user authentication against Active Directory (Windows Server 2008 R2) on AIX V6 with LDAP. It works fine.
And here's my problem:
How can I control ldap user permissions on the local AIX machine?
E.g. an AD user should be able to write all files of local sys... (1 Reply)
Discussion started by: xia777
1 Replies
4. Solaris
Hi,
I need to configure 4 ip address (same subnet and mask) in one ipmp group (two interfaces) in an active active formation (link based). Can some one provide the steps or a tutorial link.
Thanks (2 Replies)
Discussion started by: Mack1982
2 Replies
5. AIX
First, let me start off saying this is not spam. This is me trying to help out other AIX Admins with MS AD servers. If it is not applicable to you, someone else will find it useful.
As long as the "KDC" service is running on your AD server, these steps should work. There should be no... (3 Replies)
Discussion started by: kah00na
3 Replies
6. Shell Programming and Scripting
#!/bin/bash
for digit in $(seq 1 10)
do
if ping -c1 -w2 192.168.1.$digit &> /dev/null
then
echo "192.168.1.$digit is UP"
else
echo "192.168.1.$digit is DOWN"
fi
done (3 Replies)
Discussion started by: fusetrips
3 Replies
7. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
Send a fortune to all active/logged in users
2. Relevant commands, code, scripts, algorithms:
So I understand... (8 Replies)
Discussion started by: kjcraig77
8 Replies
LEARN ABOUT DEBIAN
seaudit
seaudit(8) System Manager's Manual seaudit(8)
NAME
seaudit - SELinux graphical audit log analysis tool
SYNOPSIS
seaudit [OPTIONS] [POLICY ...]
DESCRIPTION
seaudit allows the user to view and filter the contents of a log file. seaudit supports the syslog and auditd log formats and provides
queries to inspect the SELinux policy based on log messages.
POLICY
seaudit supports loading a SELinux policy in one of four formats.
source A single text file containing policy source for versions 12 through 21. This file is usually named policy.conf.
binary A single file containing a monolithic kernel binary policy for versions 15 through 21. This file is usually named by version - for
example, policy.20.
modular
A list of policy packages each containing a loadable policy module. The first module listed must be a base module.
policy list
A single text file containing all the information needed to load a policy, usually exported by SETools graphical utilities.
If no policy file is provided, seaudit will search for the system default policy: checking first for a source policy, next for a binary
policy matching the running kernel's preferred version, and finally for the highest version that can be found. If no policy can be found,
seaudit will begin with no policy loaded.
OPTIONS
-l FILE, --log=FILE
Upon startup, open the log FILE instead of the system log file.
-h, --help
Print help information and exit.
-V, --version
Print version information and exit.
AUTHOR
This manual page was written by Jeremy A. Mowery <jmowery@tresys.com>.
COPYRIGHT
Copyright(C) 2006-2007 Tresys Technology, LLC
BUGS
Please report bugs via an email to setools-bugs@tresys.com.
SEE ALSO
seaudit-report(8)
seaudit(8)