Document Information
Preface
Part I Security Overview
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
3. Controlling Access to Systems (Tasks)
4. Virus Scanning Service (Tasks)
5. Controlling Access to Devices (Tasks)
6. Using the Basic Audit Reporting Tool (Tasks)
7. Controlling Access to Files (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
11. Privileges (Tasks)
12. Privileges (Reference)
Part IV Solaris Cryptographic Services
13. Solaris Cryptographic Framework (Overview)
14. Solaris Cryptographic Framework (Tasks)
15. Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
17. Using PAM
18. Using SASL
19. Using Solaris Secure Shell (Tasks)
20. Solaris Secure Shell (Reference)
Part VI Kerberos Service
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Part VII Solaris Auditing
28. Solaris Auditing (Overview)
29. Planning for Solaris Auditing
30. Managing Solaris Auditing (Tasks)
Solaris Auditing (Task Map)
Configuring Audit Files (Task Map)
Configuring Audit Files (Tasks)
Configuring and Enabling the Auditing Service (Task Map)
Configuring and Enabling the Auditing Service (Tasks)
Configuring the Auditing Service in Zones (Tasks)
Managing Audit Records (Task Map)
Managing Audit Records
31. Solaris Auditing (Reference)
Glossary
Index
The following task map points to procedures for configuring and enabling the auditing service. The tasks are ordered.
Task
Description
For Instructions
1. (Optional) Change the audit configuration files
Selects which events, classes, and users require auditing.
2. Create audit partitions
Creates disk space for the audit files, and protects them with file permissions.
How to Create Partitions for Audit Files
3. Create the audit_warn alias
Defines who should get email warnings when the auditing service needs attention.
How to Configure the audit_warn Email Alias
4. (Optional) Change audit policy
Defines additional audit data that your site requires.
How to Configure Audit Policy
5. Configure auditing in non-global zones
Enable non-global zones to collect auditing records
6. Enable auditing
Turns on the auditing service.
How to Enable the Auditing Service
When perzone auditing is turned on, enables auditing in a non-global zone.
Example 30-18
7. (Optional) Disable auditing
Turns off the auditing service.
How to Disable the Auditing Service
When perzone auditing is turned on, disables auditing in a non-global zone.
Example 30-23
8. (Optional) Reread auditing configuration changes
Reads audit configuration changes into the kernel while the auditd daemon is running.
How to Update the Auditing Service