Sponsored Content
Top Forums UNIX for Dummies Questions & Answers How to find out who changed the file permission in unix Post 302593422 by Uttamnsd on Thursday 26th of January 2012 10:16:01 PM
Old 01-26-2012
Thanks for your quick reply.
And yes i will enable auditing from now on.
I will try to find out now as you suggested hope so i will get some good results out of it.
And it would be of great help if you can help me out with find command to findout the scripts containing "chown" Command?
 

10 More Discussions You Might Find Interesting

1. Linux

How to changed Permission on Tape

I am unable to backup file on my tape drive # mt -f /dev/st0 status SCSI 2 tape drive: File number=0, block number=0, partition=0. Tape block size 0 bytes. Density code 0x25 (DDS-3). Soft error count since last status=0 General status bits on (45010000): BOT WR_PROT ONLINE IM_REP_EN #... (6 Replies)
Discussion started by: real-chess
6 Replies

2. Shell Programming and Scripting

Find File with permission below 664

Hi Using find i want to find files with permission below 664. (6 Replies)
Discussion started by: aliahsan81
6 Replies

3. Solaris

/usr/bin has been changed with 777 permission

Hello Guruz, Relay bad condition :mad: Some has changed the permission to 777 recursively for /usr/bin directory by mistake. Now all the permission looks to be 777 on /usr/bin Hence I am so many system related errors as 1 show below. When I am trying to change the password, I am getting... (5 Replies)
Discussion started by: bullz26
5 Replies

4. UNIX for Advanced & Expert Users

UNIX file Permission

I am trying to FTP files from windows to UNIX (IBM AIX). After having sent the files to unix server. Permisssion of the files becomes 640 (rw-r-----). I have to manually login to unix and do chmod 644 on the folder to give it permission. Is it possible that the files automaically be set to 644 on... (2 Replies)
Discussion started by: puspendu.das.in
2 Replies

5. OS X (Apple)

I accidentally changed to only write permission on /usr/bin... please Help!

I accidentally changed to sudo chmod a=w to my /usr/bin folder on my macbook with OS 10.5.8... Please help! I can't even get into a terminal correctly cause it displays: -bash: uname: command not found -bash: cut: command not found -bash: uname: command not found -bash: cut: command not found... (6 Replies)
Discussion started by: scaryMac23
6 Replies

6. UNIX for Dummies Questions & Answers

Simple question on unix file permission

As I understand the file permissions in UNIX is basically Owner, group, others Lets assume scott user who's primary group is dev creates a file called test.dat and then grants some privileges on that file... scott@unix-host> echo "this is a test" > test.dat scott@unix-host> chmod 640... (4 Replies)
Discussion started by: luft
4 Replies

7. HP-UX

owner Permission changed automatically

HI all, We had created new user using the command useradd -d /home/selva -s /usr/local/bin/bash selva. But it didnt created the home directory on /home. So i manually created, copied skel files manually and changed the owner from root to selva. At the same time i observed that so many files... (6 Replies)
Discussion started by: selvaforum
6 Replies

8. AIX

Syslogs permission not getting changed - aix 6.1

Friends, I've tried to modify the syslogs permission by using the perm option in the syslog configuration in AIX 6.1 TL 05. But its not getting applied after the configuration. Have restarted the syslog service also. Need your help!:wall: The below are the conf details and os versions >... (1 Reply)
Discussion started by: novaothers
1 Replies

9. Shell Programming and Scripting

Script to echo "File permissions or ownership changed from required " when accidentally changed.

Hi All, I have to work in the late nights some times for server maintenance and in a hurry to complete I am accidentally changing ownership or permission of directories :( which have similar names ( /var in root and var of some other directory ).:confused: Can some one suggest me with the... (1 Reply)
Discussion started by: shiek.kaleem
1 Replies

10. Linux

Mount point permission was changed

Hello everybody, I have many mount points on my virtual Redhat server, two of them lost their (write) permission, so they became read-only filesystems. I fixed this problem. But I want to know why it happened? What is the reason behind that to avoid it again? Where can I find related logs?... (2 Replies)
Discussion started by: Mohannad
2 Replies
auditmask(8)						      System Manager's Manual						      auditmask(8)

Name
       auditmask - get or set auditmasks

Syntax
       auditmask [ option ...  ] [ event[:succeed:fail]

Description
       The  command  with  no  arguments displays the system-calls and trusted-events currently being audited for the system, and displays whether
       they are being audited under successful or failed occurrences or both.  The format used for the display is acceptable as input to the  com-
       mand.

       The command with event arguments sets the system-call and trusted-event audit masks for the system.  This is cumulative operation, so it is
       possible to turn on or off audit for one set of events, then turn on or off audit for a second set of events without changing the first set
       of  events (except for intersection between the two sets).  Command line arguments to can include one or more events, each with an optional
       field :succeed:fail, where succeed is either 0 to specify no auditing of successful occurrences of event, or 1 (or any non-zero	character)
       to specify auditing of successful occurrences of event; and fail is either 0 to specify no auditing of failed occurrences of event or 1 (or
       any non-zero character) to specify auditing of failed occurrences of event.  The event name is the system-call name  or	the  trusted-event
       name (see audit.h ).

       The command will also accept redirected input, which can be the output of a previously issued command.  This is a file which contains lines
       of the format event [succeed][fail].  If the keyword succeed is present, successful occurrences of that event will be audited; if the  key-
       word  fail  is  present,  failed  occurrences of that event will be audited; if both are present, successful and failed occurrences will be
       audited; if neither keyword is present, that event will not be audited.

       The auditmask command can also be used to set the audit style characteristics of the audit subsystem.  These  characteristics  control  how
       much information is recorded on exec operations.

       The  command  is  used in to initialize the auditmask at boot time according to the file This makes use of privileged operations within the
       system call.

Options
       -f	   Turns on full auditing for the system.  This list may include events which have no symbolic name and are represented only by  a
		   number (reserved for future use); these events will not be audited, despite their presence in the auditmask.

       -n	   Turns off all auditing for the system.

       -s aud_style
		   An  aud_style  of  "exec_argp" enables the auditing of the argument list to an or syscall.  An aud_style of "exec_envp" enables
		   the auditing of the environment strings to an or syscall.

See Also
       audcntl(2)

																      auditmask(8)
All times are GMT -4. The time now is 05:58 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy