03-21-2019
Quote:
Originally Posted by
ggayathri
How do I find out when/who modified the id settings?
This is a part of systems administration which is called "auditing": security is to make sure only the right person/function is allowed to do things. Auditing is about documenting what he has done and when and why.
As with security the OS offers way to implement it but you have to actually implement it for it to be in place. You
can run a system without any security and you
can run it without any auditing in place - it might not be wise to do so, but it is possible. Finding out after the fact about what has happened is possible - to some degree, like Don Cragun already insinuated - but in a strict sense not possible. I suggest you take the lesson learned from that and put a system in place that will prevent you getting into the same situation. Thats the best you can do.
Notice that you should make a thorough plan for such an endeavour before implementing it. In most companies this is done on an ad-hoc basis ("we had this incident lastly so how do we prevent it") and usually by people not working the system. This is the reasons a lot of practically unworkable systems are in place. You need to get a tradeoff between practicality, performance impact, documentation needs a few other things. Otherwise the tendency is people search for (and find) shortcuts to circumvent the system to get their work done still in reasonable time and with reasonable effort.
If you have a room with valuable goods in it it makes sense to put a lock on the door. If you try to "enhance security" and put 10 locks on the door and everybody needing to get in there has only one key so that he needs to get 9 other people to convene to open the door chances are the things in this room will be placed outside of it just to avoid having to go through the hassle. This is exactly the opposite of what the door was supposed to do when the first lock was placed on it. Sadly enough i have seen such "solutions" proposed ad put into place times and again.
I hope this helps.
bakunin
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Did anyone knows how to check size/usage of a Volume Group in AIX 4.3.3? (4 Replies)
Discussion started by: s_aamir
4 Replies
2. UNIX for Dummies Questions & Answers
Is there a log or command in unix to check who created a user group?
Thanks in advance (3 Replies)
Discussion started by: newbit
3 Replies
3. Shell Programming and Scripting
Hi all,
How can I check if a particular user id belongs to a group?
(ie. how to check if the current user `whoami` is part of the a certain group? do i use the group name of group id?)
Thanks in advance (2 Replies)
Discussion started by: rockysfr
2 Replies
4. AIX
Hi all,
I would like to ensure that a volume group has an effective quorum setting of 1 (or off). I know you can change the quorum setting using the chvg -Q command but want to know if the setting has been changed before the vg was varied on or a reboot.
In other words how can I ensure that... (3 Replies)
Discussion started by: backslash
3 Replies
5. Solaris
Previously , i remove the disk by
#vxdg -g testdg -k rmdisk testdg02
But i got error when i -k adddisk
bash-2.03# vxdisk list
DEVICE TYPE DISK GROUP STATUS
c0t0d0s2 auto:none - - online invalid
c0t1d0s2 auto:none ... (1 Reply)
Discussion started by: waibabe
1 Replies
6. Red Hat
Hello,
How can I obtain a lists of disks with their size (anytype: SAN LUNs, internal disks, etc.) attached to the system and not being extended inside a volume group?
The purpose of this list is to be part of a function of a script that I'm doing in order to resize filesystems and in the... (6 Replies)
Discussion started by: asanchez
6 Replies
7. AIX
Hi huys,
Sorry for my bad english, i'm french :o .
I've got a little question : is there a way to check status of a VG on aix 6.1 ? I want to know if a VG is locked or not...
I can do a "lsvg -Ll rootvg" for example, but if this VG is already locked, the process waits without gives me the... (2 Replies)
Discussion started by: akorx
2 Replies
8. Shell Programming and Scripting
Hi Gurus,
I need check existing number of file based on the list in file list.
for example:
in my file list. I have below:
abc, file1.txt
abc, file2.txt
abc, file3.txt
abc, file4.txt
cde, filea1.txt
cde, filea2.txt
cde, filea3.txt
...
in my current file direcotry, I have file:... (0 Replies)
Discussion started by: ken6503
0 Replies
9. UNIX for Dummies Questions & Answers
How do you check users in a linux group? (7 Replies)
Discussion started by: cokedude
7 Replies
10. UNIX for Dummies Questions & Answers
hello masters ,
please help here. I have 4 cols, I am looking for consistent 'geno' values within
'line', 'part' combinations. If the geno values are not consistent within a 'line', 'part' block, then we delete that block. One of the complications is that geno values are always 2 character, but... (7 Replies)
Discussion started by: ritakadm
7 Replies
LEARN ABOUT ULTRIX
install
install(1) General Commands Manual install(1)
Name
install - install binaries
Syntax
install [-c] [-m mode] [-o owner] [-g group] [-s] binary destination
Description
The binary is moved to destination. If destination already exists, it is removed before binary is moved. If the destination is a direc-
tory then binary is moved into the destination directory with its original file-name.
The command refuses to move a file onto itself.
Options
-c Copies binary to destination.
-g group Specifies a different group from group staff for destination. The destination is changed to group system; the -g group
option may be used to specify a different group. The user must belong to the specified group and be the owner of the
file or the superuser.
-m mode Specifies a different mode from the standard 755 for destination.
-o owner Specifies a different owner from owner root for destination. The destination is changed to current owner. The -o
owner option may be used to specify a different owner, but only the superuser can change the owner.
-s Strips the binary after it is installed.
See Also
chgrp(1), chmod(1), cp(1), mv(1), strip(1), chown(8)
install(1)