<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Loging capability in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205317#M733822</link>
    <description>the easy way is to captre the .sh file:&lt;BR /&gt;for a user that becomes root you can add the next line in the /.profile to sort out who is doing wat...&lt;BR /&gt;        USERNAME=`/usr/bin/who am i|/usr/bin/awk ' { print $1}'`&lt;BR /&gt;        if [ ! -z "$USERNAME" ]; then&lt;BR /&gt;                USERPROFILE=/home/$USERNAME/.profile&lt;BR /&gt;                HISTFILE=/.sh_history.$USERNAME&lt;BR /&gt;                if [ -r $USERPROFILE ]; then&lt;BR /&gt;                        . $USERPROFILE&lt;BR /&gt;                fi&lt;BR /&gt;        else&lt;BR /&gt;                # number histfile to keep users apart, remove file on exit&lt;BR /&gt;                HISTFILE=/.sh_history.$$&lt;BR /&gt;                trap "echo 'logout root';rm -f $HISTFILE" 0 9&lt;BR /&gt;        fi&lt;BR /&gt;        HISTSIZE=8048&lt;BR /&gt;        export HISTFILE HISTSIZE&lt;BR /&gt;date &amp;gt;&amp;gt; /.sh_history.$USERNAME&lt;BR /&gt;&lt;BR /&gt;However this file can be changed by the user it self...&lt;BR /&gt;&lt;BR /&gt;you can alsow use the  "Audited Users" I never have used it but you can configered it via sam &lt;BR /&gt; Auditing and Security    &lt;BR /&gt; Audited Users&lt;BR /&gt;&lt;BR /&gt;I was told this is using system resources so do not run it on a high loaded system</description>
    <pubDate>Fri, 30 May 2008 12:39:18 GMT</pubDate>
    <dc:creator>F Verschuren</dc:creator>
    <dc:date>2008-05-30T12:39:18Z</dc:date>
    <item>
      <title>Security Loging capability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205314#M733819</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Is there any common tool available for HP-UX/Solaris and Linux which can log all the tasks/commands performed by a user from the time he login to the time he logs out?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;</description>
      <pubDate>Tue, 27 May 2008 12:31:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205314#M733819</guid>
      <dc:creator>Sanjiv Sharma_1</dc:creator>
      <dc:date>2008-05-27T12:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Security Loging capability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205315#M733820</link>
      <description>Hi Sanjiv&lt;BR /&gt;&lt;BR /&gt;you can use script to log the users activity&lt;BR /&gt;&lt;BR /&gt;#man script&lt;BR /&gt;&lt;BR /&gt;you can apply audit in hp-ux&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 May 2008 12:44:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205315#M733820</guid>
      <dc:creator>Jeeshan</dc:creator>
      <dc:date>2008-05-27T12:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Security Loging capability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205316#M733821</link>
      <description>Hi Sanjiv,&lt;BR /&gt;&lt;BR /&gt;   Please use script command.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;DK</description>
      <pubDate>Fri, 30 May 2008 09:06:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205316#M733821</guid>
      <dc:creator>Deepak Kulkarni</dc:creator>
      <dc:date>2008-05-30T09:06:37Z</dc:date>
    </item>
    <item>
      <title>Re: Security Loging capability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205317#M733822</link>
      <description>the easy way is to captre the .sh file:&lt;BR /&gt;for a user that becomes root you can add the next line in the /.profile to sort out who is doing wat...&lt;BR /&gt;        USERNAME=`/usr/bin/who am i|/usr/bin/awk ' { print $1}'`&lt;BR /&gt;        if [ ! -z "$USERNAME" ]; then&lt;BR /&gt;                USERPROFILE=/home/$USERNAME/.profile&lt;BR /&gt;                HISTFILE=/.sh_history.$USERNAME&lt;BR /&gt;                if [ -r $USERPROFILE ]; then&lt;BR /&gt;                        . $USERPROFILE&lt;BR /&gt;                fi&lt;BR /&gt;        else&lt;BR /&gt;                # number histfile to keep users apart, remove file on exit&lt;BR /&gt;                HISTFILE=/.sh_history.$$&lt;BR /&gt;                trap "echo 'logout root';rm -f $HISTFILE" 0 9&lt;BR /&gt;        fi&lt;BR /&gt;        HISTSIZE=8048&lt;BR /&gt;        export HISTFILE HISTSIZE&lt;BR /&gt;date &amp;gt;&amp;gt; /.sh_history.$USERNAME&lt;BR /&gt;&lt;BR /&gt;However this file can be changed by the user it self...&lt;BR /&gt;&lt;BR /&gt;you can alsow use the  "Audited Users" I never have used it but you can configered it via sam &lt;BR /&gt; Auditing and Security    &lt;BR /&gt; Audited Users&lt;BR /&gt;&lt;BR /&gt;I was told this is using system resources so do not run it on a high loaded system</description>
      <pubDate>Fri, 30 May 2008 12:39:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205317#M733822</guid>
      <dc:creator>F Verschuren</dc:creator>
      <dc:date>2008-05-30T12:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Security Loging capability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205318#M733823</link>
      <description>Hi Sanjiv,&lt;BR /&gt;&lt;BR /&gt;script is a simple tool. If you put it in user's .profile (read only) and redirect the output a file which is also read only then all the keystrokes of the user can be logged in the output file&lt;BR /&gt;&lt;BR /&gt;script keys.file&lt;BR /&gt;&lt;BR /&gt;There is a commercial tool called Symark PowerBroker which is capable to log all the keystrokes of the user including root (you can define for it) and can be played back the keys later auditing.&lt;BR /&gt;&lt;BR /&gt;Regards.</description>
      <pubDate>Sat, 31 May 2008 08:43:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-loging-capability/m-p/4205318#M733823</guid>
      <dc:creator>Rasheed Tamton</dc:creator>
      <dc:date>2008-05-31T08:43:40Z</dc:date>
    </item>
  </channel>
</rss>

