<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Super user acttivity audit in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737378#M729293</link>
    <description>The BEST out there is a combination of SUDO and Enhanced Korn Shell (eKsh). And it is really all about capturing user activity.&lt;BR /&gt;&lt;BR /&gt;eKSH or ksh93 allows you to save that shells histoy file to multiple off-site (or local),  non-volatile, non-editable (WORM) storage.&lt;BR /&gt;&lt;BR /&gt;configure ksh93 to suite your needs&lt;BR /&gt;build/install&lt;BR /&gt;restrict root logins to console&lt;BR /&gt;set up sudo ("sudo -s -E" only for admins)&lt;BR /&gt;&lt;BR /&gt;This has proven valuable for both the Admin and Governance in "investigating what happened".&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 12 Jan 2011 14:14:01 GMT</pubDate>
    <dc:creator>Alzhy</dc:creator>
    <dc:date>2011-01-12T14:14:01Z</dc:date>
    <item>
      <title>Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737376#M729291</link>
      <description>Hi list,&lt;BR /&gt;&lt;BR /&gt;I have to implement some kind of super user auditing and configure all HPUX servers not to permit direct root logon.&lt;BR /&gt;&lt;BR /&gt;I know I can accomplish some of this using sudo and configuring the OS so that the root user cannot logon...but I would like to know if is there any HPUX utility or third party application that could give me more control and more information about what each superuser is actually doing...&lt;BR /&gt;&lt;BR /&gt;Any help is appreciated.&lt;BR /&gt;&lt;BR /&gt;Mario</description>
      <pubDate>Wed, 12 Jan 2011 13:58:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737376#M729291</guid>
      <dc:creator>Mario Behring</dc:creator>
      <dc:date>2011-01-12T13:58:19Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737377#M729292</link>
      <description>There is a product called Power Broker that can do what you want.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.beyondtrust.com/PowerBroker-Servers-Unix.aspx?section=PowerBroker-Servers-Unix" target="_blank"&gt;http://www.beyondtrust.com/PowerBroker-Servers-Unix.aspx?section=PowerBroker-Servers-Unix&lt;/A&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:05:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737377#M729292</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2011-01-12T14:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737378#M729293</link>
      <description>The BEST out there is a combination of SUDO and Enhanced Korn Shell (eKsh). And it is really all about capturing user activity.&lt;BR /&gt;&lt;BR /&gt;eKSH or ksh93 allows you to save that shells histoy file to multiple off-site (or local),  non-volatile, non-editable (WORM) storage.&lt;BR /&gt;&lt;BR /&gt;configure ksh93 to suite your needs&lt;BR /&gt;build/install&lt;BR /&gt;restrict root logins to console&lt;BR /&gt;set up sudo ("sudo -s -E" only for admins)&lt;BR /&gt;&lt;BR /&gt;This has proven valuable for both the Admin and Governance in "investigating what happened".&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:14:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737378#M729293</guid>
      <dc:creator>Alzhy</dc:creator>
      <dc:date>2011-01-12T14:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737379#M729294</link>
      <description>There is reason why you have the 'root' account.  What if you had a problem on the server and you need to be able to login as root to fix it...but now you can't.&lt;BR /&gt;&lt;BR /&gt;I'm all for security, but I see problems with this line of thought.  Some software requires the root account to perform certain functions, not an su to root, but root.&lt;BR /&gt;&lt;BR /&gt;There are some third party softwares out there that will log all keyboard entry and output to a file for you to review.  Powerbroker/Symark is one I'm aware of.  You can use it on an adhoc basis so you don't wind up with extreme amount of logfiles that nobody ever looks at.  So you might just track those 'super users' accounts.&lt;BR /&gt;If someone has to be 'root' then Powerbroker might work, but if not they could be required to run 'script' and that would then put their keyboard for the activity to a file.&lt;BR /&gt;&lt;BR /&gt;Just a couple thoughts,&lt;BR /&gt;Rita</description>
      <pubDate>Wed, 12 Jan 2011 14:15:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737379#M729294</guid>
      <dc:creator>Rita C Workman</dc:creator>
      <dc:date>2011-01-12T14:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737380#M729295</link>
      <description>This is the official download/build site of eKSH:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www2.research.att.com/sw/download/" target="_blank"&gt;http://www2.research.att.com/sw/download/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:19:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737380#M729295</guid>
      <dc:creator>Alzhy</dc:creator>
      <dc:date>2011-01-12T14:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737381#M729296</link>
      <description>Ma'm:&lt;BR /&gt;&lt;BR /&gt;Most corporates these days have a standard of:&lt;BR /&gt;&lt;BR /&gt;1) restricting root access to the console&lt;BR /&gt;2) super user fine grained access (RBAC)&lt;BR /&gt;3) restrictive FULL root access via SUDO&lt;BR /&gt;4) trackable activity (to protect us ADMINS primarily -- beleieve me it is to OUR advantage!)&lt;BR /&gt;&lt;BR /&gt;(4) above is best achieved via AT&amp;amp;T's enhanced korn shell (aka ksh93). It not only allows you to track what you've done but builds your own knowledgebase and protect you from suspicious colleagues and governance)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;In fact, I've already seen FULL CHANGE control processes in place for ANY root access. Even Physical Access to servers requier change control.&lt;BR /&gt;&lt;BR /&gt;Emergencies you say?  Yep an admin can still access readily the OS/its tools -- but the most important thing here is TRACKED access - for their and OUR protection.&lt;BR /&gt;&lt;BR /&gt;Cheers!&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:24:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737381#M729296</guid>
      <dc:creator>Alzhy</dc:creator>
      <dc:date>2011-01-12T14:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737382#M729297</link>
      <description>More:&lt;BR /&gt;&lt;BR /&gt;The riskiest thingy on any UNIX and UNIX Like Operating system is its master being logged in on the root command line.&lt;BR /&gt;&lt;BR /&gt;As anything can happen HOWEVER responsible we think we are:&lt;BR /&gt;&lt;BR /&gt;Issues like:&lt;BR /&gt;&lt;BR /&gt;- accidental PASTE of a nasty command&lt;BR /&gt;- accidental PASTE of a CLIPBOARD that contains commands detrimental to the OS&lt;BR /&gt;- accidental recall and exec of a SHUTDOWN command&lt;BR /&gt;- accidental recall and exec of a nasty rm command&lt;BR /&gt;-- the list goes on and on.&lt;BR /&gt;&lt;BR /&gt;;^))&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:28:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737382#M729297</guid>
      <dc:creator>Alzhy</dc:creator>
      <dc:date>2011-01-12T14:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737383#M729298</link>
      <description>Alzy, I too agree with standards - I agree with being secure - most definitely Sir.&lt;BR /&gt;&lt;BR /&gt;I took his statement "..configure all HPUX servers not to permit direct root logon." as attempting to even inhibit login at even including the console.  &lt;BR /&gt;&lt;BR /&gt;There is a point to where you can be so safe you cripple an admin's ability to do a job.&lt;BR /&gt;&lt;BR /&gt;My biggest concern for systems anymore seems to be in the fact that too many untaught, unwilling to open a book and learn, "somebody tell me how to do my job that I can't even explain effectively what the problem is", are sitting behind   keyboards with the title UNIX Administrator.&lt;BR /&gt;&lt;BR /&gt;Now that to me is the biggest security threat problem.  And all the logs in creation will not protect those systems or those businesses who have chosen to follow the careless route of hiring the unqualified because it's cheaper...or better yet - outsourcing.&lt;BR /&gt;&lt;BR /&gt;Like others, I do try to be good and sudo as a rule, but I must admit that I too have logged in as root and fixed something from the command line when I had to. &lt;BR /&gt;&lt;BR /&gt;Kindest regards,&lt;BR /&gt;Rita&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:47:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737383#M729298</guid>
      <dc:creator>Rita C Workman</dc:creator>
      <dc:date>2011-01-12T14:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737384#M729299</link>
      <description>Hi,&lt;BR /&gt;a native approach might be ;&lt;BR /&gt;&lt;BR /&gt;allow/deny root logins with /etc/securetty</description>
      <pubDate>Wed, 12 Jan 2011 15:29:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737384#M729299</guid>
      <dc:creator>Hakki Aydin Ucar</dc:creator>
      <dc:date>2011-01-12T15:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737385#M729300</link>
      <description>&lt;A href="http://www.faqs.org/docs/securing/chap5sec41.html" target="_blank"&gt;http://www.faqs.org/docs/securing/chap5sec41.html&lt;/A&gt;</description>
      <pubDate>Wed, 12 Jan 2011 15:31:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/4737385#M729300</guid>
      <dc:creator>Hakki Aydin Ucar</dc:creator>
      <dc:date>2011-01-12T15:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Super user activity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/6085167#M729301</link>
      <description>&lt;P&gt;You should use CaclMgr: it comes with the shlog. You can put root account in dual control just in case when direct use of root account is needed, you can still use it provided both information security staff and system admin need be present.&lt;/P&gt;&lt;P&gt;With CaclMgr and shlog, the key strokes will be logged and can later replay back using shlog-replay.&lt;/P&gt;&lt;P&gt;CaclMgr is far more secure than sudo, and its control over environment variables and there value ranges are far better than any other privilege delegation software on UNIX/Linux. Also, the CaclMgr is multi-user friendly, has lot more security features to maintain the security, and can be used by any privilege accounts, such as dba account, to directly grant another account or group to use the account's privilege to execute predefined command.&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2013 03:12:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/6085167#M729301</guid>
      <dc:creator>Victor_60</dc:creator>
      <dc:date>2013-05-30T03:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: Super user acttivity audit</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/6373517#M729302</link>
      <description>&lt;P&gt;I realize this is an older post, but I need to implement this exact senario using sudo and ksh. Does anyone have more information on exactly how to make this happen?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where do I get eksh and how do I configure it and sudo?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate any assistance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-thanks&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2014 21:44:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/super-user-acttivity-audit/m-p/6373517#M729302</guid>
      <dc:creator>rl4518</dc:creator>
      <dc:date>2014-02-12T21:44:53Z</dc:date>
    </item>
  </channel>
</rss>

