JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 11 Security Guidelines     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

1.  Overview of Oracle Solaris Security

2.  Configuring Oracle Solaris Security

3.  Monitoring and Maintaining Oracle Solaris Security

Verifying File Integrity by Using BART

Using the Audit Service

Monitoring audit_syslog Audit Summaries

Reviewing and Archiving Audit Logs

Finding Rogue Files

A.  Bibliography for Oracle Solaris Security

Finding Rogue Files

You can locate the potentially unauthorized use of the setuid and setgid permissions on programs. A suspicious executable file grants ownership to a user rather than to a system account, such as root or bin.

For the procedure and an example, see How to Find Files With Special File Permissions in Oracle Solaris 11.1 Administration: Security Services.