Sponsored Content
Operating Systems Solaris Unix file, folder permissions, security auditing tools. Post 302500788 by kchinnam on Tuesday 1st of March 2011 01:55:56 PM
Old 03-01-2011
Those two tools appear to be geared towards system administrators.
I am mostly interested in checking just application folders and files.

Are there any custom scripts that only check folders and files not worry about super user level auditing.
 

7 More Discussions You Might Find Interesting

1. Cybersecurity

Unix Security and auditing

I am starting an audit of unix security within our company and am looking for any information that may assist me with this. I am looking for any tips or pointers that I should be aware of when looking at unix. I am very new to unix so any help will do. Maybe there is someone out the that has had... (3 Replies)
Discussion started by: GW01
3 Replies

2. UNIX for Advanced & Expert Users

UNIX File Permissions

Hello, What does the following mean in terms of file permissions. -rw-rwSrw- 1 owner group 999 May 25 2004 file_name What does the "S" stand for. Thanks in advance for your input. :) (3 Replies)
Discussion started by: jerardfjay
3 Replies

3. Windows & DOS: Issues & Discussions

folder permissions

I work for a big company and all the people within my unit share a common drive to save documents to. I am listed in the group(AMS group) that has access rights to folders within this drive. but i'm trying to restrict access to a confidential folder so that only I can access it. when I set the... (0 Replies)
Discussion started by: shed
0 Replies

4. Cybersecurity

Directory of Security Links (Software Tools)

Hello, If you are interested in security, check out this new directory of unix and linux related software tools. Security - Links If you have any of your favorite tools, feel free to add them to the directory. (0 Replies)
Discussion started by: Neo
0 Replies

5. Shell Programming and Scripting

Unix File Permissions

I want to change one of my Dir permissions to drwx--S--- Can you tell me which number i have to use. Thanks in Advance (4 Replies)
Discussion started by: veeru
4 Replies

6. Tips and Tutorials

Unix File Permissions

Introduction I have seen some misinformation regarding Unix file permissions. I will try to set the record straight. Take a look at this example of some output from ls: $ ls -ld /usr/bin /usr/bin/cat drwxrwxr-x 3 root bin 8704 Sep 23 2004 /usr/bin -r-xr-xr-x 1 bin bin ... (6 Replies)
Discussion started by: Perderabo
6 Replies

7. Ubuntu

Folder permissions

Hi Team, I want to set permissions to one folder in such a way that the user can write files or create folder inside that but should not able to delete it. Basically reason behind this is i am using Pidgin Messenger. There is a directory of logs in which, when user chat its store his logs.... (2 Replies)
Discussion started by: paragnehete
2 Replies
secsetup(8)						      System Manager's Manual						       secsetup(8)

Name
       secsetup - enable the enhanced security features

Syntax
       /usr/etc/sec/secsetup

Description
       The command is an interactive facility that allows you to enable the enhanced security features on your system.	You must first have loaded
       the enhanced security subset onto your system before running the command.

       The command allows you to configure your system either for security auditing, trusted path, enhanced login, or  any  combination  of  those
       features.  In addition, the command may add lines to the file.  To remove entries from the you must edit it by hand.  The command only adds
       lines to this file if they aren't already present.  You can run while the system is in multiuser mode (however,	some  inconsistencies  may
       result  from  this.   See the Security Guide for Administrators for more information).  To run type the following and then answer the ques-
       tions that follow:
       # /usr/etc/sec/secsetup
       Depending on the security features chosen, when completes you may need to replace your system's kernel and reboot the system.  For example,
       chosing either the security auditing or trusted path feature may require you to re-build your kernel.

Files
See Also
       set_audit_mask(8), auth(5), svc.conf(5)
       Security Guide for Administrators

																       secsetup(8)
All times are GMT -4. The time now is 10:38 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy