Document Information
Preface
Part I Security Overview
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
3. Controlling Access to Systems (Tasks)
4. Virus Scanning Service (Tasks)
5. Controlling Access to Devices (Tasks)
6. Using the Basic Audit Reporting Tool (Tasks)
7. Controlling Access to Files (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
11. Privileges (Tasks)
12. Privileges (Reference)
Part IV Solaris Cryptographic Services
13. Solaris Cryptographic Framework (Overview)
14. Solaris Cryptographic Framework (Tasks)
15. Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
17. Using PAM
18. Using SASL
19. Using Solaris Secure Shell (Tasks)
20. Solaris Secure Shell (Reference)
Part VI Kerberos Service
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Part VII Solaris Auditing
28. Solaris Auditing (Overview)
29. Planning for Solaris Auditing
30. Managing Solaris Auditing (Tasks)
Solaris Auditing (Task Map)
Configuring Audit Files (Task Map)
Configuring Audit Files (Tasks)
Configuring and Enabling the Auditing Service (Task Map)
Configuring and Enabling the Auditing Service (Tasks)
Configuring the Auditing Service in Zones (Tasks)
Managing Audit Records (Task Map)
Managing Audit Records
31. Solaris Auditing (Reference)
Glossary
Index
The following task map points to the procedures for configuring files to customize auditing at your site. Most of the tasks are optional.
Task
Description
For Instructions
Select audit classes, and customize audit_control settings
Involves:
Preselecting system-wide audit classes
Specifying the audit directories for each system
Setting disk space limits on audit file systems
How to Modify the audit_control File
(Optional) Log audit events in two modes
Enables you to monitor audit events in real time, in addition to storing audit records in binary format.
How to Configure syslog Audit Logs
(Optional) Change audit characteristics for users
Sets user-specific exceptions to the system-wide preselected audit classes.
How to Change a User's Audit Characteristics
(Optional) Add audit classes
Reduces the number of audit records by creating a new audit class to hold events.
How to Add an Audit Class
(Optional) Change event-to-class mappings
Reduces the number of audit records by changing the event-class mapping.
How to Change an Audit Event's Class Membership