From the course: Linux: System Maintenance
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Audit security access, groups, and users - Linux Tutorial
From the course: Linux: System Maintenance
Audit security access, groups, and users
- [Instructor] Taking a moment to audit who has access to resources on your system is a good idea for ongoing maintenance. Often, access to resources is controlled by creating users and adding them to groups. At the command line, we can take a look at the users on our system with cat /etc/passwd. This shows users' short names, as we can see with my account here, an x representing the encrypted password for the user, which you can see in the shadow file, the numeric user ID and primary group ID, the comment field, which is often used for a human-friendly name, the user's home folder, and the users logged in shell. The system creates a lot of users, and some software creates users too. So in this file you'll see a lot more than just the regular human users for your system. These system and service accounts aren't for logging in but rather for adding the ability to control the permission that different processes have. Otherwise they'd either need to run as root, which can be dangerous…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Explore load and uptime4m 3s
-
(Locked)
System logs4m 22s
-
(Locked)
Security logs2m 17s
-
(Locked)
Audit security access, groups, and users3m 24s
-
(Locked)
Check memory and process status3m 24s
-
(Locked)
Explore system resource usage with top6m 55s
-
(Locked)
Check free disk space1m 51s
-
(Locked)
Check disk status3m
-
-
-
-