<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failed root login in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/failed-root-login/m-p/2418152#M765802</link>
    <description>Nick,&lt;BR /&gt;&lt;BR /&gt;Your best bet is probably to use /etc/securetty to restrict root logins to only &lt;BR /&gt;the console. There is a man page on securetty if you need more info on that. &lt;BR /&gt;Then users who need root access will be forced to su to the root account when &lt;BR /&gt;logging in remotely. Each of these su attempts will be monitored and logged. &lt;BR /&gt;</description>
    <pubDate>Wed, 09 Feb 2000 06:59:09 GMT</pubDate>
    <dc:creator>Jason Luginbuhl_1</dc:creator>
    <dc:date>2000-02-09T06:59:09Z</dc:date>
    <item>
      <title>Failed root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/failed-root-login/m-p/2418150#M765800</link>
      <description>I would like to configure a script likely, that will email me when someone has &lt;BR /&gt;tried to logon as root and failed.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Nickd&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 07 Feb 2000 05:54:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/failed-root-login/m-p/2418150#M765800</guid>
      <dc:creator>Nick D'angelo_3</dc:creator>
      <dc:date>2000-02-07T05:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: Failed root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/failed-root-login/m-p/2418151#M765801</link>
      <description>I would suggest creating the script to look at /var/adm/sulog checking for &lt;BR /&gt;unsuccessful attempts and runs periodically from cron.&lt;BR /&gt;&lt;BR /&gt;Good Luck!</description>
      <pubDate>Mon, 07 Feb 2000 07:57:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/failed-root-login/m-p/2418151#M765801</guid>
      <dc:creator>Robert Gamble_3</dc:creator>
      <dc:date>2000-02-07T07:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: Failed root login</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/failed-root-login/m-p/2418152#M765802</link>
      <description>Nick,&lt;BR /&gt;&lt;BR /&gt;Your best bet is probably to use /etc/securetty to restrict root logins to only &lt;BR /&gt;the console. There is a man page on securetty if you need more info on that. &lt;BR /&gt;Then users who need root access will be forced to su to the root account when &lt;BR /&gt;logging in remotely. Each of these su attempts will be monitored and logged. &lt;BR /&gt;</description>
      <pubDate>Wed, 09 Feb 2000 06:59:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/failed-root-login/m-p/2418152#M765802</guid>
      <dc:creator>Jason Luginbuhl_1</dc:creator>
      <dc:date>2000-02-09T06:59:09Z</dc:date>
    </item>
  </channel>
</rss>

