- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Log the keystoke from remote access
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-03-2004 12:11 AM
04-03-2004 12:11 AM
Log the keystoke from remote access
TIA
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-03-2004 02:39 AM
04-03-2004 02:39 AM
Re: Log the keystoke from remote access
I believe there are 3rd party products in this space. The best VMS native tool would probably be SET HOST /LOG.
Maybe can point the vendor to a relatively easy, captive, guest account which then prompts them for a sort-of-secure real logging from a script with set host/log?!
fwiw,
Hein.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-03-2004 04:33 AM
04-03-2004 04:33 AM
Re: Log the keystoke from remote access
Since we have NO DECnet connections to the outside world (network guys can't or won't handle it, regrettably) it is very easy to distinguish in LOGIN.COM between an outside (FTP) and a local (DECnet) remote login.
If FTP, then SET HO 0/LOG=
Of course LOGIN.COM has a security alarm.
I think you will be able to adapt this idea to your local needs.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-03-2004 08:42 AM
04-03-2004 08:42 AM
Re: Log the keystoke from remote access
DetectiveAO from Pointsecure ( http://www.pointsecure.com/sysdetao.htm ) seems to be a product that fills your request.
Greetings, Martin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-04-2004 03:11 PM
04-04-2004 03:11 PM
Re: Log the keystoke from remote access
I have a DS10 that is my firewall/gateway for all remote access into my VMS servers. All activity is logged at the same source for the license cost of one DS10. This is also my DSNLINK system, and Consoleworks system. So, when Compaq/HP connect to this server, I have logs of the activity, and I can monitor (Peek) what they are doing. This is especially helpful when you are trouble shooting an issue and you need to discuss what is scrolling by on the console of a system.
The SPY function allows you to takeover their session and even lock their keyboard input.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-04-2004 04:14 PM
04-04-2004 04:14 PM
Re: Log the keystoke from remote access
You need 2 usernames for the user. The first is captive and has no password. The LOGIN.COM just does:
$ SET HOST/LOG=filespec 0
second-username
the user only enters a password at the second login. This second account is restricted and does a check on login that the "remote" user and node are
the first account (rejecting any logins that aren't). This should be done from SYLOGIN.COM. Simplest approach is to grant an identifier (say "SECURE_USER") to mark users who must login this way.
If you have many users, then call the first user something like "SECURE" then have the user enter their actual username/password to the second. They will see something like:
Username: SECURE
WARNING - All activity will be logged
Username: VENDOR
Password: password
The truly paranoid will dedicate a system to the "SECURE" account. External logins will be directed to it via a private subnet, and SET HOST to the internal network. All logins will be checked that they originate from the logging system.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-05-2004 06:07 PM
04-05-2004 06:07 PM
Re: Log the keystoke from remote access
I would advise that you explore ControlIT and SupportIT from RAXCO. I have been using these products for years and they are pretty cool. They allow you to view your users screen, help you to gain control of their screens and so on. You can get additional info from the following site
http://www.raxco.com/products/downloadit/vms_download.cfm
In case you are not willing to spend on this software, then you may have to explore some VMS native ways of logging things like
set h/log and so on
regards
Mobeen