StealthAUDIT for Unix has been preconfigured to provide deep visibility into important Unix concepts including privileged access rights, user and group details, and sharing configurations. Additionally, StealthAUDIT provides extensible, flexible controls capable of reaching into any aspect of Unix/Linux, facilitating and automating any collection, analysis, and reporting task at enterprise-scale.
Automatically discover and parse all rights granted via sudoers, in addition to identifying the owners of critical files such as password, shadow, sudoers, hosts, deny, and more
Users and Groups
Inventory and analyze User and Group details, highlighting issues including password security settings, “toxic” group conditions such as duplicate/empty/large groups, and inconsistencies across systems
Assess and analyze NFS and Samba share configurations for potentially insecure share settings, highlighting and categorizing high, medium, and low risk scenarios through generated reports