HP-UX Host Intrusion Detection System Version 4.4 Release Notes (5900-1612, April 2011)

1. Ensure that your administration and agent systems meet the requirements as described in
“Hardware and Software Requirements” (page 15).
2. If you want to migrate your existing schedules to HIDS 4.2, complete the steps listed in
“Migrating Schedules from Older Versions of HIDS” (page 16).
3. Perform the preinstallation tasks described in “Preinstallation” (page 16).
4. Create software depots for the administration system and the agent systems, as described in
“Making Depots” (page 16).
5. Install the software on your administration and agent systems, as described in “Installing the
Depots” (page 20).
6. Perform the post-installation tasks described in “Postinstallation” (page 22).
7. Create secure communication certificates and perform other configuration tasks, as outlined
in “Configuration” (page 22).
Hardware and Software Requirements
Check that your systems meet the requirements for installing HP-UX HIDS.
Administration and Agent Systems
Each administration and agent system must meet the following requirements:
The administration and agent system must be running HP-UX 11i v3. To check, enter the
following command:
# uname -r
It should display B.11.31.
The system must be running on HP-UX 11i v3.
You must be a superuser to do the installation.
Administration System
The system on which you plan to install the administration software must meet the following
requirements:
You must have 26 MB of free disk space in /opt/ids and space for configuration files in
/etc/opt/ids and log files in /var/opt/ids.
You must have Java 2 Platform Standard Edition 5.0 (J2SE 5.0) and all the corresponding
Java patches. Java installation is part of these installation instructions.
Agent Systems
Each system on which you plan to install the agent software must meet the following requirements:
You must have 8 MB of free disk space in /opt/ids.
The memory mapped file (/var/opt/ids/ids_*) is 20 M in size. HP recommends that you
have at least 50 M of free space in /var for the memory mapped files and log files.
The cron daemon must be enabled. Refer to cron(1M) for more information.
Virtual memory usage by the idscor process can be as high as 200 M. You may need to
increase the maxdsiz tunable parameter for your system.
Dual System
If a system is both an administration system and an agent system, it must meet the requirements
for both system types.
Hardware and Software Requirements 15