Skip Navigation Links | |
Exit Print View | |
Oracle Solaris 11 Security Guidelines Oracle Solaris 11.1 Information Library |
1. Overview of Oracle Solaris Security
2. Configuring Oracle Solaris Security
3. Monitoring and Maintaining Oracle Solaris Security
Verifying File Integrity by Using BART
Monitoring audit_syslog Audit Summaries
You can locate the potentially unauthorized use of the setuid and setgid permissions on programs. A suspicious executable file grants ownership to a user rather than to a system account, such as root or bin.
For the procedure and an example, see How to Find Files With Special File Permissions in Oracle Solaris 11.1 Administration: Security Services.