Skip Navigation Links | |
Exit Print View | |
Oracle Solaris 11 Security Guidelines Oracle Solaris 11 Information Library |
1. Overview of Oracle Solaris 11 Security
2. Configuring Oracle Solaris 11 Security
3. Monitoring and Maintaining Oracle Solaris 11 Security
Using the Basic Audit Reporting Tool
Monitoring audit_syslog Audit Summaries
You can locate the potentially unauthorized use of the setuid and setgid permissions on programs. A suspicious executable file grants ownership to a user rather than to a system account, such as root or bin.
For the procedure and an example, see How to Find Files With Special File Permissions in Oracle Solaris Administration: Security Services.