Previous | Table of Contents | Next |
You can collect reports from a number of client systems into a directory on the server to make comparing ASET reports easier.
To collect reports on a server:
share -F nfs -o rw=<client-hostname>/usr/aset/<rptdir>/<client_rpt>
The following example collects ASET reports from the client seachild on the server castle:
castle% su Password: castle# cd /usr/aset castle# mkdir all_reports castle# cd all_reports castle# mkdir seachild_rpt castle# vi /etc/dfs/dfstab share -F dfs -o rw=seachild /usr/aset/all_reports/seachild_rpt ZZ castle# shareall
On the client, seachild:
seachild% su Password: seachild# mount castle:/usr/aset/all_reports/seachild_rpt /usr/aset/ reports seachild# vi /etc/vfstab castle:/usr/aset/all_reports/seachild_rpt /usr/aset/reports nfs - yes hard ZZ seachild#
When ASET is executed for the first time, it saves and archives the original system files in the /usr/aset/archive directory. You can use the /usr/aset/aset.restore utility to reinstate these files. If ASET is currently scheduled for periodic execution, it also removes the line from the crontab entry.
Any changes made to system files are lost when you run aset.restore.
Use the aset.restore utility:
To restore system files modified by ASET:
The following example restores system files to their pre-ASET state:
# /usr/aset/aset.restore aset.restore: beginning restoration ... Executing /usr/aset/tasks/firewall.restore Beginning firewall.restore... firewall.restore failed: /usr/sbin/in.routed.asetoriginal not found. Executing /usr/aset/tasks/sysconf.restore Beginning sysconf.restore... Restoring /etc/inetd.conf. Saved existing file in /etc/inetd.conf.asetbak. Restoring /etc/aliases. Saved existing file in /etc/aliases.asetbak. sysconf.restore completed. Executing /usr/aset/tasks/tune.restore Beginning tune.restore... (This may take a while.) tune.restore completed. Executing /usr/aset/tasks/usrgrp.restore Beginning usrgrp.restore... Restoring /etc/passwd. Saved existing file in /etc/passwd.asetbak. Restoring /etc/group. Saved existing file in /etc/group.asetbak. Restoring /etc/shadow. Saved existing file in /etc/shadow.asetback. usrgrp.restore completed. Descheduling ASET from crontab file... The following is the ASET schedule entry to be deleted: 1 2 * * * [ -x /usr/sbin/rtc ] && /usr/sbin/rtc -c > /dev/null 2>&10 0 * * * /usr/aset/aset -d /usr/aset Proceed to deschedule: (y/n) y Resetting security level from low to null. aset.restore: restoration completed. #
Note that the firewall restore was not successful in this example.
The aset.restore script does not remove files from the /usr/aset/reports and the /usr/aset/archive directories. If you want to reclaim that file system space, you may want to delete the contents of these directories.
Previous | Table of Contents | Next |