<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HP-UX Security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-security/m-p/4731368#M386489</link>
    <description>Hi &lt;BR /&gt;&lt;BR /&gt;For PCI Audit they need &lt;BR /&gt;1.access log (su , sftp ,ssh etc)&lt;BR /&gt;2.system logs (syslogs)&lt;BR /&gt;2 file integrity reports &lt;BR /&gt;4. Capacity planning report ( Hp openview capacity advisor reports are good for this )&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You can enable access logs reach at syslog and then route those logs to a machine with huge space ( we call it as log server ) . then you can enable auditing and using cron job move this audit files in every one hour to log server . You can use HIDS for FIM ( file integrity monitor)&lt;BR /&gt;&lt;BR /&gt;ArcSight Logger  is one of best tool for log management.&lt;BR /&gt;&lt;BR /&gt;/Bibith</description>
    <pubDate>Wed, 29 Dec 2010 06:49:09 GMT</pubDate>
    <dc:creator>bibith dathan</dc:creator>
    <dc:date>2010-12-29T06:49:09Z</dc:date>
    <item>
      <title>HP-UX Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-security/m-p/4731366#M386487</link>
      <description>For PCI requirement  I started to implement Security and  Auditing tools in SMH , and it worked successfully .&lt;BR /&gt;Now  I need Centralized  tools to collect all logs from all system in one data base to consume size of these files in every individual server and  to be easiest way to monitor these logs &lt;BR /&gt;If SIM sufficient to do that .. how can I do that with sim ?&lt;BR /&gt;If not what is the tool to do that  &lt;BR /&gt;Please Help me..&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Dec 2010 15:35:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-security/m-p/4731366#M386487</guid>
      <dc:creator>remonsamir</dc:creator>
      <dc:date>2010-12-28T15:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: HP-UX Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-security/m-p/4731367#M386488</link>
      <description>edit (if it is not there, then create) /etc/syslog.conf&lt;BR /&gt;&lt;BR /&gt;inside the file, type these lines:&lt;BR /&gt;&lt;BR /&gt;*.alert&lt;TAB&gt;root&lt;BR /&gt;*.debug&lt;TAB&gt;@10.1.1.10&lt;BR /&gt;&lt;BR /&gt;here &lt;TAB&gt; means hitting the tab key once do not literally type it. syslog.conf file does not understand space character. delimiter is tab character.&lt;BR /&gt;&lt;BR /&gt;also replace the ip address 10.1.1.10 with the log server's IP address.&lt;BR /&gt;&lt;BR /&gt;How you can analyze the central log repository is totally up to you there are many log miner utilities out there. But for the PCI people, just showing them the syslog.conf files from the source servers and giving them the raw log files should be sufficient. They have their own tools to analyze those files if they want to.&lt;/TAB&gt;&lt;/TAB&gt;&lt;/TAB&gt;</description>
      <pubDate>Tue, 28 Dec 2010 17:15:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-security/m-p/4731367#M386488</guid>
      <dc:creator>Mel Burslan</dc:creator>
      <dc:date>2010-12-28T17:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: HP-UX Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-security/m-p/4731368#M386489</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;For PCI Audit they need &lt;BR /&gt;1.access log (su , sftp ,ssh etc)&lt;BR /&gt;2.system logs (syslogs)&lt;BR /&gt;2 file integrity reports &lt;BR /&gt;4. Capacity planning report ( Hp openview capacity advisor reports are good for this )&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You can enable access logs reach at syslog and then route those logs to a machine with huge space ( we call it as log server ) . then you can enable auditing and using cron job move this audit files in every one hour to log server . You can use HIDS for FIM ( file integrity monitor)&lt;BR /&gt;&lt;BR /&gt;ArcSight Logger  is one of best tool for log management.&lt;BR /&gt;&lt;BR /&gt;/Bibith</description>
      <pubDate>Wed, 29 Dec 2010 06:49:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-ux-security/m-p/4731368#M386489</guid>
      <dc:creator>bibith dathan</dc:creator>
      <dc:date>2010-12-29T06:49:09Z</dc:date>
    </item>
  </channel>
</rss>

