- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Commands or Procedures to Examine Security Policie...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-15-2004 04:38 AM
06-15-2004 04:38 AM
Commands or Procedures to Examine Security Policies
General Account Policy, Password Policy on Initial Login, Aging, Time between Change, Maximum Fail Login Attempts and Restricting Root login to the system consoles only.
I thank you for any assistance you can give in uncovering the mystery of Trusted Host and any useful commands that will provide a quick glance at the policies and configuration in force.
Thanks
Don
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-15-2004 04:42 AM
06-15-2004 04:42 AM
Re: Commands or Procedures to Examine Security Policies
The trusted database is under /tcb directory.
e.g.
/usr/lbin/getprp -m liftm "user_name"
Will give you the lifetime(days) of the usser user_name
/usr/lbin/getprpw user_name will all details.
Anil
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-15-2004 04:44 AM
06-15-2004 04:44 AM
Re: Commands or Procedures to Examine Security Policies
Take the screen print as you check or set these policies. Thats the way I make our auditors happy.
In the case of root restrictions, print out the configuration file involved. If the auditors know nothing about HP-UX you may wish to provide them the pages from documentation HP-UX Security in this case or itrc that explaints the configuration files.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-15-2004 04:49 AM
06-15-2004 04:49 AM
Re: Commands or Procedures to Examine Security Policies
I understand that these systems are trusted so
'getprdef' and 'getprpw' can be used to gather the information you are looking for. The corresponding information is in /tcb/files/auth/
The above are some of the tools/files that may help you in tightening user security. Try "Bastille" that can help you report and configure any security issues in other areas.
http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6849AA
-Sri
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-15-2004 08:40 AM
06-15-2004 08:40 AM