Look at 'man sulog'. Solaris 'su' won't log commands being executed by the given user. It only logs the attempt/failure/success of su. If you really want to maintain a trail of commands executed by the user once they have su(d) to another user, you'll have to enable C2 auditing and use the Basic Security Module (BSM) for such.
Look at the script /etc/security/bsmconv. It enables auditing on the system and after reboot auditd will be running. You need to understand what you are enabling before just running the script. Enabling auditing on a system can degrade performance between 5 and 15% - more if you audit too many events. It will allow you to use praudit and audit reduce in order to trace user activities.
If there really is some interest in using BSM, I'll drop a FAQ - just let me know.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.