O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

System Logs

Reviewing, analyzing, and acting on system logs is a must and is an integral part of the security process discussed in Chapter 1, “Enterprise Security Framework.” The following log files should be carefully and periodically reviewed for any suspicious records, and appropriate actions should be immediately taken.

syslog

Most UNIX software uses syslog (the system logging daemon) for logging. syslog is configured using /etc/syslog.conf. By default, /var/adm/messages is used to log the majority of events. Another file, /var/log/syslog, is used to log mail-related events.

Depending on the particular role of the system you are configuring, a different syslog configuration might be required. The ideal amount of logging should provide enough ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required