SnapOverflow

SnapOverflow Logo SnapOverflow Logo

SnapOverflow Navigation

  • Home
  • Server
  • Ubuntu

Mobile menu

Close
  • Home
  • System Administrators
    • Hot Questions
    • New Questions
    • Tags
  • Ubuntu
    • Hot Questions
    • New Questions
    • Tags
  • Help
Home / server / Questions

Questions[user-management](server)

Martin Hope
Supratik
Asked: 2011-12-01 06:01:06 +0800 CST

How do I log every command executed by a user?

  • 41

I want to monitor all user's activity in my server.

Even when the user executes a shell command from some editor like vim I want to see them in the log file.

I have checked the tool acct but it is not listing the complete commands. (Please correct me if I have missed some options which does already).

Which Linux tool I should be looking at to solve this problem?

linux user-management
  • 5 Answers
  • 105445 Views
Martin Hope
void.pointer
Asked: 2011-10-21 07:27:32 +0800 CST

Creating a windows account only for share access

  • 27

I'm running Windows Server 2008 R2 in a workgroup, not a domain, and I want to create a local account that is only used for allowing other computers in the same workgroup to access file shares on that server.

When clients connect they will be prompted for a username/password (hopefully) and this account would serve as a way to allow them access.

I do not want this account to have a profile, or be used to actually log into the server itself. I only need it as a way to authenticate users for shared folders.

Can this be done? If not, what is the recommended approach for this?

windows file-sharing user-management windows-server-2008-r2
  • 3 Answers
  • 35067 Views
Martin Hope
ewwhite
Asked: 2011-08-20 13:00:31 +0800 CST

Email hoarder intervention and education - (Exchange environment)

  • 29

Throughout my career, I've encountered quite a few users who were email hoarders...

I'm managing a 100-user environment where users previously had 100mb quotas and a basic Cyrus IMAP/Postfix solution. That led to lots of locally-stored mail and the related problems with data-retention and lost mail following PC failures.

I promptly moved towards Exchange 2010 with MailArchiva (for discovery/archiving) and have been humming along for nearly a year in this setup. Everything inbound and out is archived and retained for compliance purposes. I initially set 3GB mailbox limits per user. A handful of users needed extra space for their working sets of email and were able to justify it, so I've made some exceptions. However, I have one particularly-bad (but important) user whose Inbox is presently 22,000 items, of which 14,000 are unread. It's probably not the number of messages, but the nature of the email; lots of reports, statements and large PDF attachments. This is also a Blackberry user, so I suspect that they read mail selectively, based on subject. The user has hit the 3GB limit for the first time and is unwilling to prune the mailbox. I took care of their 3,000 deleted items to keep mail flowing, but am at a loss on how to educate users on how to organize their email. I can institute stringent policies and be a hardass, or I could sit with the user and help sort and purge mail. Either way, it doesn't address the real issue of how to help with education.

Does anyone here have any tips on how to deal with this type of situation? I'd like some example guidelines. If you're using policies in your firm, what types of policies help keep people under control?

I find that people use mail differently, but it's a challenge to force them into a particular way of organization. I may not even be the best example, but I also know what to keep and what to delete.

Update - The first battle is over, in that I've been able to keep the user under the Exchange mailbox limit by some reasonable pruning. However, I went to rebuild the user's computer and discovered a 17GB local PST file with just over 6,500 subfolders! The user had been copying (not moving) messages into an array of subfolders; sometimes with single messages being copied/filed into multiple folders. Underscores (_) and prefixes (a-z) were used to control the display order of the folders within the file! The user had also been CC'ing themselves on outbound email so as to have an Inbox record of messages to later be filed into one of the local PST's subfolders. This is an absolute misuse of the technology and is a scary way to organize company data. I am handing it over to the owners to address the situation, as it's now a company liability.

disk-space-utilization email user-management exchange-2010
  • 8 Answers
  • 1862 Views
Martin Hope
Thierry Lam
Asked: 2010-02-06 20:54:20 +0800 CST

What's the default superuser username/password for postgres after a new install?

  • 464

I have just installed postgres 8.4 on Ubuntu 9.10 and it has never asked me to create a superuser. Is there a default superuser and its password? If not, how do I create a new one?

user-management postgresql
  • 5 Answers
  • 1138706 Views
Martin Hope
voyager
Asked: 2009-06-04 17:11:49 +0800 CST

Is it feasible to have home folder hosted with NFS?

  • 32

I'm planning to deploy some kiosk computers and would like to leave them with a small pendrive as boot disk, keeping the rest at an easy to back up server, ala LTSP.

Right now I'm pondering two options. An NFSed /home/, or a local copy of ~/ copied on login, rsynced on logout.

My fears are that working with files might get too slow, or my network might get clogged.

nfs unix user-management home-directory
  • 10 Answers
  • 65656 Views

Sidebar

Stats

  • Questions 681965
  • Answers 980273
  • Best Answers 280204
  • Users 287326
  • Popular
  • Answers
  • Marko Smith

    Can you pass user/pass for HTTP Basic Authentication in URL parameters?

    • 5 Answers
  • Marko Smith

    Ping a Specific Port

    • 18 Answers
  • Marko Smith

    Check if port is open or closed on a Linux server?

    • 7 Answers
  • Marko Smith

    How to automate SSH login with password?

    • 10 Answers
  • Marko Smith

    How do I tell Git for Windows where to find my private RSA key?

    • 30 Answers
  • Marko Smith

    What's the default superuser username/password for postgres after a new install?

    • 5 Answers
  • Marko Smith

    What port does SFTP use?

    • 6 Answers
  • Marko Smith

    Command line to list users in a Windows Active Directory group?

    • 9 Answers
  • Marko Smith

    What is a Pem file and how does it differ from other OpenSSL Generated Key File Formats?

    • 3 Answers
  • Marko Smith

    How to determine if a bash variable is empty?

    • 15 Answers
  • Martin Hope
    Davie Ping a Specific Port 2009-10-09 01:57:50 +0800 CST
  • Martin Hope
    Smudge Our security auditor is an idiot. How do I give him the information he wants? 2011-07-23 14:44:34 +0800 CST
  • Martin Hope
    kernel Can scp copy directories recursively? 2011-04-29 20:24:45 +0800 CST
  • Martin Hope
    Robert ssh returns "Bad owner or permissions on ~/.ssh/config" 2011-03-30 10:15:48 +0800 CST
  • Martin Hope
    Eonil How to automate SSH login with password? 2011-03-02 03:07:12 +0800 CST
  • Martin Hope
    gunwin How do I deal with a compromised server? 2011-01-03 13:31:27 +0800 CST
  • Martin Hope
    Tom Feiner How can I sort du -h output by size 2009-02-26 05:42:42 +0800 CST
  • Martin Hope
    Noah Goodrich What is a Pem file and how does it differ from other OpenSSL Generated Key File Formats? 2009-05-19 18:24:42 +0800 CST
  • Martin Hope
    Brent How to determine if a bash variable is empty? 2009-05-13 09:54:48 +0800 CST
  • Martin Hope
    cletus How do you find what process is holding a file open in Windows? 2009-05-01 16:47:16 +0800 CST

Related Questions

Trending Tags

linux nginx windows networking ubuntu domain-name-system amazon-web-services active-directory apache-2.4 ssh

Explore

  • Home
  • Questions
    • Hot Questions
    • New Questions
  • Tags
  • Help

Footer

SnapOverflow

About Us

  • About Us
  • Contact Us

Legal Stuff

  • Privacy Policy

Help

© 2022 SOF-TR. All Rights Reserve