The Wizard function exists in the Disk Usage Information by Filesystem, the User Configuration, the Configured Printers, and the Host Configuration windows. These Wizards help administrators maintain system security and usability by checking the status of various functions and settings.
Click the Wizard button to view the appropriate analysis window. Select the type of security evaluations you want, then click the Apply button.
A summary of findings will be displayed in the top right portion of the window (as shown in Figure A-1). Use the window buttons for further analysis.
![]() | Note: The evaluations marked by a star (*) are relatively time-consuming. |
Detail
Use this button to display (in the evaluation area) a detailed list of findings for those entries highlighted in the summary window.
Remedies
Just knowing that there is a potential problem does not necessarily solve it. You can use this button to get a brief description of the problems encountered for the entries highlighted in the summary window. Furthermore, the Wizard will also make suggestions on how to remedy the problems using EnlightenDSM.
Suggestions
Use this button to see suggestions on how to avoid the problem in the future for any entries highlighted in the summary window.
You can use this button to print the contents of the explanation area, as defined in the default print command field in the Session Preferences window. See “Session Preferences” for more details on setting up this command.
The remaining sections of this chapter detail the security check options within each of the four Wizards.
The Disk Wizard performs a series of disk checks with an emphasis on security needs.
This is a simple test to check if disk usage on any of the partitions has surpassed 85% capacity.
When a set UID or GID (setuid) program is executed, it gains the permissions of the owner/group of the program. Consequently, a setuid program owned by root will give the user super user privileges when executed. This concept is fine as long as these programs have the proper built-in safety mechanisms. Without the proper safety mechanisms, these programs can create a major security risk.
Wizard runs several checks on setuid programs when this option is selected. It performs the checks against the current disk snapshots of all partitions. Furthermore, some of the checks involve the use of the associated Master snapshot. Make sure the disk snapshots for all partitions are relatively new. See “Save Current Snapshots” for more information on re-creating snapshots and creating Master Snapshots.
First, the Wizard checks if each setuid program found is in what it considers to be a system directory. If not, this will be reported. The current system directories are:
/bin /sbin /etc /usr/bin /usr/sbin /usr/lib /usr/ucb /usr/kvm /etc |
Next, the Wizard checks the permissions of the program. If the program is world-writable, that is, may be replaceable, this will be reported.
Finally, if a master snapshot for the partition being checked exists, the Wizard checks if the setuid program existed at the time the master snapshot was created. If the setuid program has been newly created since the master snapshot was taken, this will be reported. If the program did previously exist, Wizard checks if it is still the same file by looking for a difference in the file's size, permissions, or date of last modification.
Device files are used in UNIX as an interface to the hardware and kernel memory. These device files should only be found in the directory /dev (and on some systems /devices). If a device file is found outside of these directories, it should be considered a serious threat.
Wizard scans the existing disk snapshots looking for devices not in the /dev or /devices (where appropriate) directories when this option is selected. If any files are found, they are reported.
The User Wizard helps with user-related problems.
This operation searches for users with different names sharing the same UID. There may be times when this usage is necessary.
This operation searches for users with the same name using different UIDs on different hosts. Typically a user should have a consistent UID on all hosts.
This operation is similar to the User Home Directory security check in the security menu. See “User Home Directories” for more information on this check.
This operation is a subset of the obvious password checking in the security menu. It checks if the user has a password, if the password is the same as the username, or if the password is zero length (just press Enter to get in). For more detailed password checking, see “Obvious Passwords”.
The Printer Wizard checks for printer-related problems.
This checks if a print queue for any of the printers has more than 15 print jobs queued. If so, this is reported. If a print queue gets too long you might want to move some of the jobs to other compatible printers. See “Move” for more details.
The Host Wizard checks for potential host conflicts.
This check looks at all hostnames and their associated TCP/IP addresses and verifies all hosts of a given name have the same network address. If a hostname is found on one host with a different address than on another host, this is reported.