<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Audit trail in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203461#M167108</link>
    <description>Thanks to all.  For whatever reason, they have chosen not to implement our system as "trusted".  I like the idea of the script to monitor logins.  At least I can check that off my "to do" list.  The shell script thing is more of a paper trail thing.  There are only three of us that even have command access to the system.</description>
    <pubDate>Fri, 27 Feb 2004 09:35:42 GMT</pubDate>
    <dc:creator>Tom Gore</dc:creator>
    <dc:date>2004-02-27T09:35:42Z</dc:date>
    <item>
      <title>Audit trail</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203457#M167104</link>
      <description>Is there a way to determine when/who changed a shell script?  Also, is there a way to produce a listing of users who have not logged into the system within the last "nn" days.  Since the introduction of the Sarbanes-Oxley Act, we are now required (by our auditors) to provide numerous "audit trail" reports.  Virtually all movement through the system has to be accounted for and documented.&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Thu, 26 Feb 2004 13:40:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203457#M167104</guid>
      <dc:creator>Tom Gore</dc:creator>
      <dc:date>2004-02-26T13:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203458#M167105</link>
      <description>If you set your system to Trusted there is a quite a bit of auditing you can do.&lt;BR /&gt;&lt;BR /&gt;David</description>
      <pubDate>Thu, 26 Feb 2004 13:46:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203458#M167105</guid>
      <dc:creator>David Child_1</dc:creator>
      <dc:date>2004-02-26T13:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203459#M167106</link>
      <description>HI&lt;BR /&gt;&lt;BR /&gt;For login info here:-&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=39611" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=39611&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;ll &amp;lt;scriptname&amp;gt; will show owner, group time and date.&lt;BR /&gt;&lt;BR /&gt;Also set-up and use change control procedures.&lt;BR /&gt;&lt;BR /&gt;Paula</description>
      <pubDate>Thu, 26 Feb 2004 13:48:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203459#M167106</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2004-02-26T13:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203460#M167107</link>
      <description>Hi Tom,&lt;BR /&gt;&lt;BR /&gt;Unless you turn the 'auditing' on, it's difficult to find out who changed what on the system. There are softwares like CA's eTrust Access-control, powerbroker etc., that can provide additional controls in addition|replacing the standard UNIX permissions along with excellent reporting.&lt;BR /&gt;&lt;BR /&gt;If this system is trusted, you can get this information easily with getprpw command. &lt;BR /&gt;&lt;BR /&gt;/usr/lbin/getprpw -m slogint &lt;USERNAME&gt; &lt;BR /&gt;&lt;BR /&gt;will tell you when the user logged in successfully. &lt;BR /&gt;&lt;BR /&gt;To find out the users that have not logged into the system exactly within the last 'n' days, you will need to write a small script. Calculate the seconds since epoch with ' /usr/contrib/bin/perl -e "printf("%d\n",time())" ' - say A. Then in each user's tcb files /tcb/files/auth/&lt;FIRSTLETTER&gt;/user) you will find seconds since epoch when the user successfully logged in - say B. Calculate (A - B)/86400 and compare it against 'nn'. &lt;BR /&gt;&lt;BR /&gt;Without trusted system, you will need to depend on 'last' command. It shows it in days which you will need to convert into epoch and then do the calculations. Also last may not provide 100% information as *tmp files it uses might have gotten trimmed.&lt;BR /&gt;&lt;BR /&gt;-Sri&lt;/FIRSTLETTER&gt;&lt;/USERNAME&gt;</description>
      <pubDate>Thu, 26 Feb 2004 13:52:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203460#M167107</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-02-26T13:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203461#M167108</link>
      <description>Thanks to all.  For whatever reason, they have chosen not to implement our system as "trusted".  I like the idea of the script to monitor logins.  At least I can check that off my "to do" list.  The shell script thing is more of a paper trail thing.  There are only three of us that even have command access to the system.</description>
      <pubDate>Fri, 27 Feb 2004 09:35:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-trail/m-p/3203461#M167108</guid>
      <dc:creator>Tom Gore</dc:creator>
      <dc:date>2004-02-27T09:35:42Z</dc:date>
    </item>
  </channel>
</rss>

