StealthAUDIT for Unix has been preconfigured to provide deep visibility into important Unix concepts including privileged access rights, user and group details, and sharing configurations. Additionally, just like Unix itself, StealthAUDIT provides extensible, flexible controls capable of reaching into any aspect of Unix and its many operating system variants, facilitating and automating any collection, analysis, and reporting task at enterprise-scale.
Automatically discover and parse all rights granted via sudoers in an audited environment, in addition to identifying the owners of critical files such as password, shadow, sudoers, hosts, deny, and more
Users and Groups
Inventory and analyze User and Group details in an audited environment, highlighting issues including Password Security Settings, “toxic” group conditions such as duplicate, empty, and large groups, and inconsistencies across systems
Assess and analyze NFS and Samba share configurations for potentially insecure share settings, highlighting and categorizing high, medium, and low risk scenarios through generated reports