partitioning scheme
lsblk information about the system
cat /etc/os-releaserequired packages installation
apt-get install sudo ufw vim openssh-server libpam-pwquality apparmor cronopen/close ports by editing /etc/ssh/sshd_config file
Port 4242
PermitRootLogin noto view SSH status
systemctl status sshenable UFW
ufw enableview status
ufw statusset default rules
ufw default deny incoming
ufw default allow outgoingadd new rule
ufw allow 4242delete rule
ufw delete allow <port>Settings -> Network -> "Attached to NAT" -> Advanced -> Port Forwarding -> add 4242 port to remotely connect to the server, run in your terminal
ssh <user>@<ip address> -p <port>view your hostname
hostnameto change it, edit /etc/hostname and /etc/hosts files and reboot
add new user
sudo useradd <user> assign password for the user
sudo passwd <user>add user to a group
usermod -aG <group> <user>delete user from a group
gpasswd -d <user> <group>delete user
deluser <user>after creating a new user and assigning it to sudo group, add rules for sudo in /etc/sudoers file
<user> ALL=(ALL:ALL) ALL
Defaults badpass_message="Your phrase"
Defaults passwd_tries=3for logging sudo, create /var/log/sudo directory and sudo.log file there
edit /etc/sudoers file
Defaults logfile="/var/log/sudo/sudo.log"
Defaults iolog_dir="/var/log/sudo"
Defaults log_input,log_output
Defaults requiretty
Defaults secure_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bincreate a monitoring.sh file, change permission settings for it
chmod +x ./monitoring.shopen crontab -e file from root and edit it
*/10 * * * * sh /usr/local/bin/monitoring.shto stop the cronjob, simply comment the line
edit /etc/login.defs file
PASS_MAX_DAYS 30
PASS_MIN_DAYS 2
PASS_WARN_AGE 7edit /etc/security/pwquality.conf file
difok = 7
minlen = 10
dcredit = -1
ucredit = -1
maxrepeat = 3
usercheck = 1
enforce_for_root)