Sponsored Content
Full Discussion: Auditing Sun Servers
Operating Systems Solaris Auditing Sun Servers Post 302681251 by sundba on Friday 3rd of August 2012 04:07:45 AM
Old 08-03-2012
Auditing Sun Servers

Hi All,

I am new joinee to this forum and recently promoted as sun administrator from dba. I still dont know whether i can handle it fully . My first task is to audit set of sun servers and findout what it is doing and whether it can be upgraded or decommissioned and if upgraded whether it can be brought into virtulisation farm. From my limited experience, I jotted down the below things which needs to be done. Just wanted experts thoughts on it.

1) serial number,model, patches,memory size,os version, application running,ports listening, any san connected.

is those list all or is there anything apart from that needs to be audited ?

Thanks for your time. Much appreciated.

Regards,
SD
 

9 More Discussions You Might Find Interesting

1. Solaris

identifying Tape drives on Sun Servers

Hi, Can you please help me to locate tape drives on Sun Server and the capacity of the tape drive. I am managing a Sun 4u server. Need this urgently. Regards, Vivek (2 Replies)
Discussion started by: vivek_scv
2 Replies

2. UNIX for Advanced & Expert Users

Default ALOM username and password for the Sun servers

Hi, Anyone please tell me the default ALOM username and password for the sun server(Sun fire V210). Thanks muthu (1 Reply)
Discussion started by: muthulingaraja
1 Replies

3. Solaris

Windows AD for Sun Solaris Servers

Hi All I have a few sun servers(5.9) on xyz.com domain. I have to integrate these servers with the Windows AD of another domain,say abc.com. My sun servers should use the AD of abc.com for user authentication. I am thinking of implementing NIS. But not too sure whether it will work. Can... (3 Replies)
Discussion started by: efunds
3 Replies

4. UNIX for Advanced & Expert Users

File Auditing in Sun Solaris environment

Hi All, I have a requirement to report us on changing a group of static files. Those are the binary files that run in Production every day. Due to the in sercure environment situations, I found many are indulging in there own changes to the binaries by doing some changes in the souce code. ... (1 Reply)
Discussion started by: mohan_kumarcs
1 Replies

5. Solaris

Cannot get my Sun Solaris servers to log into Brocade Switch

Cannot get my Sun Solaris servers to log into a Brocade 5100. All fiber has been connected correctly and all drivers and firmware are loaded and up to date according to EMCGrab report. Below is an output from server. Please Help: HBA Port WWN: 2100001b321063c4 OS Device Name: /dev/cfg/c3... (2 Replies)
Discussion started by: sbkilbride
2 Replies

6. Shell Programming and Scripting

Script to monitor sun servers temperature

Dears, need help on developing a script to monitor sun server temperature , I'm using the below command to check the servers one by one /usr/platform/`uname -i`/sbin/prtdiag -v Servers Models are : 2 x Sun SPARC Enterprise M9000 Server 4 x Sun Fire V490 2 x Sun Blade T6300 Server... (1 Reply)
Discussion started by: bejo4ever
1 Replies

7. Solaris

ILOM Banner Sun x41XX servers

Is it possible to set the information that shows in the cli banner when you login to the ILOM? In addition, after I set the hostname of the ILOM, how do I check it? (2 Replies)
Discussion started by: brialt1
2 Replies

8. UNIX for Advanced & Expert Users

Sun M5000 servers diaster recovery plan

Hi, We have two Sun M5000 systems. A is Oracle server and B is testing server. There are nine Solaris 10 zones set on A. SAN is connecting to A with ZFS configuration. Now we want to set B to be a backup server of A and make the two as identical as possible. No VERITAS cluster, no Solaris... (3 Replies)
Discussion started by: aixlover
3 Replies

9. Solaris

sun servers currently used

can anybody give me a list of sun servers currently being used in the industry (5 Replies)
Discussion started by: veritas
5 Replies
Tspi_TPM_GetAuditDigest(3)			     TCG Software Stack Developer's Reference				Tspi_TPM_GetAuditDigest(3)

NAME
Tspi_TPM_GetAuditDigest - retrieve the audit digest. SYNOPSIS
#include <tss/tspi.h> TSS_RESULT Tspi_TPM_GetAuditDigest(TSS_HTPM hTpm, TSS_HKEY hKey, TSS_BOOL closeAudit, UINT32* pulAuditDigestSize, BYTE** prgbAuditDigest, TPM_COUNTER_VALUE* pCounterValue, TSS_VALIDATION* pValidationData, UINT32* ordSize, UINT32** ordList); DESCRIPTION
Tspi_TPM_GetAuditDigest is used to retrieve the audit digest. The audit digest may be signed or unsigned. If the audit digest is signed (hKey is non-NULL) then the current audit digest, the current audit counter and, optionally, the hash of the audited ordinal list and a signature are returned. If the audit digest is not signed (hKey is NULL) then the current audit digest, the current audit counter and the full list of audited ordinals is returned. PARAMETERS
hTpm Handle of the TPM object. hKey Handle of the signature key object (the handle can be NULL). closeAudit A flag indicating whether or not to close the current audit digest after it is signed. This parameter is ignored if hKey is NULL. pulAuditDigestSize Pointer to the size of the returned audit digest. prgbAuditDigest Pointer to a buffer that holds the returned audit digest. pCounterValue Pointer to a TPM_COUNTER_VALUE structure that holds the returned audit counter. pValidationData Pointer to a validation data structure. The validation data structure provides external information required to compute the signature. On input, the fields representing the ExternalData must contain an anti-replay nonce that will be used in the signing operation. On output, this structure provides a buffer containing the data used to compute the validation data and a buffer containing the validation data (a signature generated by signing the data using the key referenced by hKey). If this parameter is NULL then the TSS will perform the valida- tion. This parameter is ignored if hKey is NULL. ordSize Pointer to the number of ordinals in the returned audited ordinal list. This parameter is ignored if hKey is non-NULL. ordList Pointer to a buffer that holds the returned audited ordinal list. This parameter is ignored if hKey is non-NULL. RETURN CODES
Tspi_TPM_GetAuditDigest returns TSS_SUCCESS on success, otherwise one of the following values are returned: TSS_E_INVALID_HANDLE TSS_E_BAD_PARAMETER TSS_E_INTERNAL_ERROR - An error occurred internal to the TSS. CONFORMING TO
Tspi_TPM_GetAuditDigest conforms to the Trusted Computing Group Software Specification Version 1.2 TSS 1.2 2007-06-27 Tspi_TPM_GetAuditDigest(3)
All times are GMT -4. The time now is 01:59 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy