<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: process history in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484841#M213874</link>
    <description>Hi,&lt;BR /&gt;if you have multiple users logging into the root account directly and you have not had the log split or command audit on, there is no way you can say who issued a command.&lt;BR /&gt;&lt;BR /&gt;We always force users to log on with their own id and then su to root. Direct root access is disabled, bar from the console.&lt;BR /&gt;So we can trace who was logged on as root at any given time from the sulog.&lt;BR /&gt;&lt;BR /&gt;Regards</description>
    <pubDate>Tue, 15 Feb 2005 07:31:21 GMT</pubDate>
    <dc:creator>Peter Godron</dc:creator>
    <dc:date>2005-02-15T07:31:21Z</dc:date>
    <item>
      <title>process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484834#M213867</link>
      <description>We have some EDP members have the root password , , I found a command have run by root user , now I want to trace who ( or IP address ) have run this command , I use "history" and /.sh_history can found the command history but can't let me know who run it , could suggest how can I know who use the command previously ? thx.</description>
      <pubDate>Mon, 14 Feb 2005 04:33:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484834#M213867</guid>
      <dc:creator>peterchu</dc:creator>
      <dc:date>2005-02-14T04:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484835#M213868</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If accounting is enabled you could use the lastcomm command.&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;Robert-Jan</description>
      <pubDate>Mon, 14 Feb 2005 04:38:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484835#M213868</guid>
      <dc:creator>Robert-Jan Goossens</dc:creator>
      <dc:date>2005-02-14T04:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484836#M213869</link>
      <description>Hi,&lt;BR /&gt;As an addition for Paul's reply&lt;BR /&gt;you can put these lines in .profile of root;&lt;BR /&gt;&lt;BR /&gt;HistUser=`who am i | awk '{print $1}'`&lt;BR /&gt;export HISTFILE=$HOME/.hist_${HistUser}&lt;BR /&gt;&lt;BR /&gt;This creates a file in / like;&lt;BR /&gt;&lt;BR /&gt;.hist_username&lt;BR /&gt;so you can easily monitor who su to root.&lt;BR /&gt;&lt;BR /&gt;Good luck,</description>
      <pubDate>Mon, 14 Feb 2005 04:55:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484836#M213869</guid>
      <dc:creator>Cem Tugrul</dc:creator>
      <dc:date>2005-02-14T04:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484837#M213870</link>
      <description>opss,&lt;BR /&gt;&lt;BR /&gt;Robert's reply...&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Feb 2005 04:58:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484837#M213870</guid>
      <dc:creator>Cem Tugrul</dc:creator>
      <dc:date>2005-02-14T04:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484838#M213871</link>
      <description>thx replies , i will set it up as suggestions , but if I want to check the history that has already made ( eg. one week ago ) , is it possible ? thx</description>
      <pubDate>Tue, 15 Feb 2005 00:57:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484838#M213871</guid>
      <dc:creator>peterchu</dc:creator>
      <dc:date>2005-02-15T00:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484839#M213872</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Unless the system is trusted you can't</description>
      <pubDate>Tue, 15 Feb 2005 01:01:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484839#M213872</guid>
      <dc:creator>Ravi_8</dc:creator>
      <dc:date>2005-02-15T01:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484840#M213873</link>
      <description>Cem:s suggestion to modify the .profile for root was a very nice one. You get a separate history file for every one that log on as root, and in each the command history for that person!&lt;BR /&gt;&lt;BR /&gt;But I suppose there is no way to protect the files so that the root-user who is ashamed of his doings can not hide what he has done?&lt;BR /&gt;&lt;BR /&gt;Hm.. maybe logging the same information as in the .history_&lt;NAME&gt; files, to a remote log-server with logger commands?&lt;BR /&gt;&lt;BR /&gt;Hm...?&lt;/NAME&gt;</description>
      <pubDate>Tue, 15 Feb 2005 07:22:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484840#M213873</guid>
      <dc:creator>Rolf Modin</dc:creator>
      <dc:date>2005-02-15T07:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484841#M213874</link>
      <description>Hi,&lt;BR /&gt;if you have multiple users logging into the root account directly and you have not had the log split or command audit on, there is no way you can say who issued a command.&lt;BR /&gt;&lt;BR /&gt;We always force users to log on with their own id and then su to root. Direct root access is disabled, bar from the console.&lt;BR /&gt;So we can trace who was logged on as root at any given time from the sulog.&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Tue, 15 Feb 2005 07:31:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484841#M213874</guid>
      <dc:creator>Peter Godron</dc:creator>
      <dc:date>2005-02-15T07:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: process history</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484842#M213875</link>
      <description>Giving the root password to non-system administrators is a huge mistake. There is no log kept of commands by user's IP address. The only solution is to implement sudo and change the root password. Now, no one logs in as root and if the user has permission to run a particular command (part of the sudo config file), it will be logged by user, date/time and the actual command. Several sysadmins actually go so far as to eliminate root logins by automatically changing the root password to a random string every 5 minutes--no one knows the root password and now all system administration is via sudo--with complete traceability and instant control (such as removing a particular user's sudo privileges).</description>
      <pubDate>Tue, 15 Feb 2005 07:36:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/process-history/m-p/3484842#M213875</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2005-02-15T07:36:32Z</dc:date>
    </item>
  </channel>
</rss>

