In my fleet there are a small handful of users that enabled the root account.
This is the EA i use to determine it from someone on this forum
#!/bin/bash
rootCheck=`dscl . read /Users/root | grep AuthenticationAuthority 2>&1 > /dev/null ; echo $?`
if [ "${rootCheck}" == 1 ]; then
echo "<result>Disabled</result>"
else
echo "<result>Enabled</result>"
fi
My questions are:
- how can i prevent this happening in the future? right now its a small number of people but if word gets out it could be bad
- since the user's set up root themselves, i dont know the password to disable it, is there a way to get it resolved to disable root for users that have it enabled?
Thanks!
