<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Audit to users in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149745#M8741</link>
    <description>Steven,&lt;BR /&gt;I need to register the activities of the users, without these they have opportunity to modify the possible logs that be generated. The histoty file is manageable by the users. &lt;BR /&gt;There is some tool that permit to register the commands introduced by the users? &lt;BR /&gt;&lt;BR /&gt;Thank in advance.&lt;BR /&gt;&lt;BR /&gt;Jorge Prado&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 19 Dec 2003 13:36:44 GMT</pubDate>
    <dc:creator>Jorge A. Prado T.</dc:creator>
    <dc:date>2003-12-19T13:36:44Z</dc:date>
    <item>
      <title>Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149743#M8739</link>
      <description>Hi,&lt;BR /&gt;As I can audit the activities that carries out a user? &lt;BR /&gt;&lt;BR /&gt;S.O: REd Hat 7.2&lt;BR /&gt;&lt;BR /&gt;Thank in advance&lt;BR /&gt;Jorge Prado</description>
      <pubDate>Fri, 19 Dec 2003 12:58:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149743#M8739</guid>
      <dc:creator>Jorge A. Prado T.</dc:creator>
      <dc:date>2003-12-19T12:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149744#M8740</link>
      <description>What about $HOME/bash_history file?&lt;BR /&gt;&lt;BR /&gt;Audit is a pretty broad term. Perhaps be specific.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 19 Dec 2003 13:11:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149744#M8740</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-12-19T13:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149745#M8741</link>
      <description>Steven,&lt;BR /&gt;I need to register the activities of the users, without these they have opportunity to modify the possible logs that be generated. The histoty file is manageable by the users. &lt;BR /&gt;There is some tool that permit to register the commands introduced by the users? &lt;BR /&gt;&lt;BR /&gt;Thank in advance.&lt;BR /&gt;&lt;BR /&gt;Jorge Prado&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Dec 2003 13:36:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149745#M8741</guid>
      <dc:creator>Jorge A. Prado T.</dc:creator>
      <dc:date>2003-12-19T13:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149746#M8742</link>
      <description>One way I'd approach that is to have a root script copy the contents of the .bash_history files to a central file periodicaly. cron can handle this.&lt;BR /&gt;&lt;BR /&gt;There isn't a whole lot you can do on a system without keystrokes.&lt;BR /&gt;&lt;BR /&gt;The files in the /var/log section contain a lot of what you are looking for. If you are monitoring Internet activity, you can increase the logging of the iptables firewall and get a ton of data.&lt;BR /&gt;&lt;BR /&gt;I'm not aware of a built in feature in Linux like HP-UX Trusted System auditing that integrates this feature. That doesn't mean it doesn't exist.&lt;BR /&gt;&lt;BR /&gt;My guess is you're going to need a third party auditing product.&lt;BR /&gt;&lt;BR /&gt;I would suggest you look for one at sourceforge.net or tucows.com&lt;BR /&gt;&lt;BR /&gt;I have to go home or I'd do it for you for extra points.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 19 Dec 2003 13:43:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149746#M8742</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-12-19T13:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149747#M8743</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Stevens approach is ok if we are talking about  situations where you are working with users cooperating with the audit, e.g. it is used to  analyze why a particular sequence of commands is not yielding the expected result.&lt;BR /&gt;&lt;BR /&gt;It is insufficient if you do need to do auditing to prevent malicious misuse, since there is plenty of opportunity for users to wipe out or alter the .bash_history between collections to a protected area (or history of another shell). You will need specialized software to do so. And there is  a good possibility you will need to pay for it.&lt;BR /&gt;&lt;BR /&gt;On a related note, depending on where you are there are legal privacy requirements that you should check before embarking on any monitoring down to the keystroke level.</description>
      <pubDate>Fri, 19 Dec 2003 15:34:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149747#M8743</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2003-12-19T15:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149748#M8744</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Stevens approach is ok if we are talking about  situations where you are working with users cooperating with the audit, e.g. it is used to  analyze why a particular sequence of commands is not yielding the expected result.&lt;BR /&gt;&lt;BR /&gt;It is insufficient if you do need to do auditing to prevent malicious misuse, since there is plenty of opportunity for users to wipe out or alter the .bash_history between collections to a protected area (or history of another shell). You will need specialized software to do so. And there is  a good possibility you will need to pay for it.&lt;BR /&gt;&lt;BR /&gt;On a related note, depending on where you are there are legal privacy requirements that you should check before embarking on any monitoring down to the keystroke level.    &lt;BR /&gt;&lt;BR /&gt;Greetings, Martin</description>
      <pubDate>Fri, 19 Dec 2003 15:37:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149748#M8744</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2003-12-19T15:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149749#M8745</link>
      <description>Here is a HOWTO on linux process accounting, I can't vouch for it as I have never tried it. It also seems a bit old (2001). However, it might be a place to start&lt;BR /&gt;&lt;A href="http://www.faqs.org/docs/Linux-mini/Process-Accounting.html" target="_blank"&gt;http://www.faqs.org/docs/Linux-mini/Process-Accounting.html&lt;/A&gt;</description>
      <pubDate>Fri, 19 Dec 2003 15:40:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149749#M8745</guid>
      <dc:creator>Paul Cross_1</dc:creator>
      <dc:date>2003-12-19T15:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149750#M8746</link>
      <description>Install the psacct package :&lt;BR /&gt;&lt;BR /&gt;psacct - Utilities for monitoring process activities.&lt;BR /&gt;&lt;BR /&gt; The psacct package contains several utilities for monitoring process activities, including ac, lastcomm, accton and sa. The ac command displays statistics about how long users have been logged on. The lastcomm command displays information about previous executed commands. The accton command turns process accounting on or off. The sa command summarizes information about previously executed commmands.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Dec 2003 19:17:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149750#M8746</guid>
      <dc:creator>Thomas_18</dc:creator>
      <dc:date>2003-12-19T19:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149751#M8747</link>
      <description>You could use the bash logging patch.&lt;BR /&gt;It modifies the history procedure so that everything written in the .bash_history file is also sent via syslog.&lt;BR /&gt;&lt;BR /&gt;Look for "bash syslog" on Google.&lt;BR /&gt;&lt;BR /&gt;One of the results:&lt;BR /&gt;&lt;A href="http://www.nardware.co.uk/Security/html/bashlogger.htm" target="_blank"&gt;http://www.nardware.co.uk/Security/html/bashlogger.htm&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;c</description>
      <pubDate>Mon, 22 Dec 2003 01:52:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149751#M8747</guid>
      <dc:creator>Cristian Draghici</dc:creator>
      <dc:date>2003-12-22T01:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Audit to users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149752#M8748</link>
      <description>You can also try the tripwire utility ,while configure it to track changes only for specific folders.&lt;BR /&gt;</description>
      <pubDate>Mon, 22 Dec 2003 03:37:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/audit-to-users/m-p/3149752#M8748</guid>
      <dc:creator>Alexander Chuzhoy</dc:creator>
      <dc:date>2003-12-22T03:37:16Z</dc:date>
    </item>
  </channel>
</rss>

