<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security auditing in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868265#M277890</link>
    <description>I asked the question to find out a way to extrat some command line methods to either set up specific requirements, I can not change my system over to a Trusted system at this time.</description>
    <pubDate>Fri, 22 Sep 2006 15:29:04 GMT</pubDate>
    <dc:creator>sanders_1</dc:creator>
    <dc:date>2006-09-22T15:29:04Z</dc:date>
    <item>
      <title>Security auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868263#M277888</link>
      <description>Is there a way to set up the auditing of logs within HPUX 11.11 without configuraing the OS environment and turning the system to a Trusted System via SAM.&lt;BR /&gt;audit monitoring parameters:&lt;BR /&gt;&amp;gt;Sucessfull/failed logins&lt;BR /&gt;&amp;gt;Change of system preocesses ( kill process )&lt;BR /&gt;&amp;gt;Pasword structuring for required changing and expiration.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 22 Sep 2006 15:20:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868263#M277888</guid>
      <dc:creator>sanders_1</dc:creator>
      <dc:date>2006-09-22T15:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Security auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868264#M277889</link>
      <description>For non-trusted NO.&lt;BR /&gt;&lt;BR /&gt;You get more information if you convert to trusted.</description>
      <pubDate>Fri, 22 Sep 2006 15:25:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868264#M277889</guid>
      <dc:creator>IT_2007</dc:creator>
      <dc:date>2006-09-22T15:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: Security auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868265#M277890</link>
      <description>I asked the question to find out a way to extrat some command line methods to either set up specific requirements, I can not change my system over to a Trusted system at this time.</description>
      <pubDate>Fri, 22 Sep 2006 15:29:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868265#M277890</guid>
      <dc:creator>sanders_1</dc:creator>
      <dc:date>2006-09-22T15:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: Security auditing</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868266#M277891</link>
      <description>you can use commands like last and lastb to find out good and bad logins.&lt;BR /&gt;&lt;BR /&gt;Didn't understand your question about Change of system processess.. please clarify.&lt;BR /&gt;&lt;BR /&gt;For non trusted it is very limited. you can check passwd -s command to find out.</description>
      <pubDate>Fri, 22 Sep 2006 15:33:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing/m-p/3868266#M277891</guid>
      <dc:creator>IT_2007</dc:creator>
      <dc:date>2006-09-22T15:33:08Z</dc:date>
    </item>
  </channel>
</rss>

