For more information about creating custom rules, refer to
Section 30.4, “Passing Pa-
rameters to the Audit System”
(page 387).
IMPORTANT: Changing Audit Rules
Never change audit rules in a running audit system. Always stop the audit
daemon with
rcauditd stop
before touching the audit configuration and
reread the audit configuration by restarting the daemon with
rcauditd
start
.
31.5 Configuring Audit Reports
To avoid having to dig through the raw audit logs to get an impression of what your
system is currently doing, run custom audit reports at certain intervals. Custom audit
reports enable you to focus on areas of interest and get meaningful statistics on the nature
and frequency of the events you are monitoring. To analyze individual events in detail,
use the ausearch tool.
Before setting up audit reporting, consider the following:
• What types of events do you want to monitor by generating regular reports? Select
the appropriate aureport command lines as described in
Section 30.5.2, “Generating
Custom Audit Reports”
(page 397).
• What do you want to do with the audit reports? Decide whether to create graphical
charts from the data accumulated or whether it should be transferred into any sort
of spreadsheet or database. Set up the aureport command line and further processing
similar to the examples shown in
Section 31.6, “Configuring Log Visualization”
(page 420) if you want to visualize your reports.
• When and at which intervals should the reports run? Set up appropriate automated
reporting using cron.
For this example, assume that you are interested in finding out about any attempts to
access your audit, PAM, and system configuration. Proceed as follows to find out about
file events on your system:
1
Generate a full summary report of all events and check for any anomalies in the
summary report, for example, have a look at the “failed syscalls” record, because
Setting Up the Linux Audit Framework
417
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......