Skip to Content
Solaris™ 8 System Administrator's Reference
book

Solaris™ 8 System Administrator's Reference

by Janice Winsor
September 2000
Beginner content levelBeginner
1312 pages
33h 47m
English
Pearson
Content preview from Solaris™ 8 System Administrator's Reference

audit — Control the Behavior of the Audit Daemon

Synopsis

/usr/sbin/audit -n | -s | -t

Description

When the Basic Security Module is enabled (see bsmconv(1M) for more information), you can use the suite of auditing commands to detect potential security breaches. Auditing can reveal suspicious or abnormal patterns of system use and provide a way to trace suspect actions back to a specific user. Auditing can serve as a deterrent: if users know that their actions are likely to be audited, they may be less likely to attempt malicious activities.

Successful auditing depends on two other security features.

  • Identification.

  • Authentication.

At login, after a user supplies a user name and password, a unique audit ID is associated with the user's process. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Essential System Administration Pocket Reference

Essential System Administration Pocket Reference

Æleen Frisch

Publisher Resources

ISBN: 0130277010Purchase book