<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: audit users actions in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660911#M242064</link>
    <description>If you want to audit user actions, then converting to trusted mode will allow you to do that.&lt;BR /&gt;&lt;BR /&gt;After you convert to trusted mode you will have to activate the auditing - you can do this via SAM or the command line.  Be aware that auditing can, and usually does, consume large amounts of disk space for the log files.&lt;BR /&gt;&lt;BR /&gt;One more note - when you convert to trusted mode, any user password over 8 charactors will be truncated.</description>
    <pubDate>Mon, 31 Oct 2005 09:56:49 GMT</pubDate>
    <dc:creator>DCE</dc:creator>
    <dc:date>2005-10-31T09:56:49Z</dc:date>
    <item>
      <title>audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660903#M242056</link>
      <description>i'd like to audit users actions. should i convert my system to a trusted system ?</description>
      <pubDate>Mon, 31 Oct 2005 06:00:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660903#M242056</guid>
      <dc:creator>Nabil Boussetta</dc:creator>
      <dc:date>2005-10-31T06:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660904#M242057</link>
      <description>hello&lt;BR /&gt;u have many advantages if u are convert to the trusted system&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;look this link too:&lt;BR /&gt;&lt;A href="http://docs.hp.com/en/B2355-90121/index.html" target="_blank"&gt;http://docs.hp.com/en/B2355-90121/index.html&lt;/A&gt;&lt;BR /&gt;regrads gga</description>
      <pubDate>Mon, 31 Oct 2005 06:08:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660904#M242057</guid>
      <dc:creator>GGA</dc:creator>
      <dc:date>2005-10-31T06:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660905#M242058</link>
      <description>You will have to.&lt;BR /&gt;When you convert to trusted mode all passwords will expire. To take care of this do /usr/lbin/modprpw -V&lt;BR /&gt;&lt;BR /&gt;If you use SAM to convert to trusted mode, you do need to use /usr/lbin/modprpw -V</description>
      <pubDate>Mon, 31 Oct 2005 06:14:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660905#M242058</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2005-10-31T06:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660906#M242059</link>
      <description>is there some disadvantage when converting to a trusted system. &lt;BR /&gt;why HP don't give this functionnality by default ?</description>
      <pubDate>Mon, 31 Oct 2005 06:25:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660906#M242059</guid>
      <dc:creator>Nabil Boussetta</dc:creator>
      <dc:date>2005-10-31T06:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660907#M242060</link>
      <description>There is a very little overhead when converted to trsuted mode. Why HP does not give this a as default will have amny answers.&lt;BR /&gt;&lt;BR /&gt;For you information, with 11i V2 next realease trusted mode will be oboletet. It is being replaced by trusted security extension product. (or something smimilar. Look/search at hp)</description>
      <pubDate>Mon, 31 Oct 2005 06:33:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660907#M242060</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2005-10-31T06:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660908#M242061</link>
      <description>hello&lt;BR /&gt;there is "more" administrative task to do&lt;BR /&gt;&lt;BR /&gt;regrads gga</description>
      <pubDate>Mon, 31 Oct 2005 06:37:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660908#M242061</guid>
      <dc:creator>GGA</dc:creator>
      <dc:date>2005-10-31T06:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660909#M242062</link>
      <description>someone tells me that you C compiler and graphical interface will not function.&lt;BR /&gt;&lt;BR /&gt;is that true ?</description>
      <pubDate>Mon, 31 Oct 2005 06:54:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660909#M242062</guid>
      <dc:creator>Nabil Boussetta</dc:creator>
      <dc:date>2005-10-31T06:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660910#M242063</link>
      <description>Almost everything will function as it is. Some applications that depend on getpwent may be needed to adjust. Now they should be maing getpwnam sys call.</description>
      <pubDate>Mon, 31 Oct 2005 06:59:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660910#M242063</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2005-10-31T06:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660911#M242064</link>
      <description>If you want to audit user actions, then converting to trusted mode will allow you to do that.&lt;BR /&gt;&lt;BR /&gt;After you convert to trusted mode you will have to activate the auditing - you can do this via SAM or the command line.  Be aware that auditing can, and usually does, consume large amounts of disk space for the log files.&lt;BR /&gt;&lt;BR /&gt;One more note - when you convert to trusted mode, any user password over 8 charactors will be truncated.</description>
      <pubDate>Mon, 31 Oct 2005 09:56:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660911#M242064</guid>
      <dc:creator>DCE</dc:creator>
      <dc:date>2005-10-31T09:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660912#M242065</link>
      <description>There is a utility that can work in conjunction with sudo. This utility is called 'rootsh' Have the users invoke rootsh via sudo commands and there will be a keystroke-by-keystroke log file with the output of user's commands.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 31 Oct 2005 10:20:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660912#M242065</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-10-31T10:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: audit users actions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660913#M242066</link>
      <description>One of the reasons Trusted System isn't the default - is that it is supported by some third party apps.&lt;BR /&gt;&lt;BR /&gt;Example - we use a a central managemanet system for controlling access to all our systems - whether they are HP, IBM, Sun or Linux.&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Mon, 31 Oct 2005 10:55:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/audit-users-actions/m-p/3660913#M242066</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2005-10-31T10:55:39Z</dc:date>
    </item>
  </channel>
</rss>

