Number of MAC events: 0
Number of failed syscalls: 994
Number of anomaly events: 0
Number of responses to anomaly events: 0
Number of crypto events: 0
Number of keys: 2
Number of process IDs: 713
Number of events: 1589
3
To list the files that could not be accessed, run a summary report of failed file
events:
aureport -f -i --failed --summary
Failed File Summary Report
===========================
total
file
===========================
80
/var
80
spool
80
cron
80
lastrun
46
/usr/lib/locale/en_GB.UTF-8/LC_CTYPE
45
/usr/lib/locale/locale-archive
38
/usr/lib/locale/en_GB.UTF-8/LC_IDENTIFICATION
38
/usr/lib/locale/en_GB.UTF-8/LC_MEASUREMENT
38
/usr/lib/locale/en_GB.UTF-8/LC_TELEPHONE
38
/usr/lib/locale/en_GB.UTF-8/LC_ADDRESS
38
/usr/lib/locale/en_GB.UTF-8/LC_NAME
38
/usr/lib/locale/en_GB.UTF-8/LC_PAPER
38
/usr/lib/locale/en_GB.UTF-8/LC_MESSAGES
38
/usr/lib/locale/en_GB.UTF-8/LC_MONETARY
38
/usr/lib/locale/en_GB.UTF-8/LC_COLLATE
38
/usr/lib/locale/en_GB.UTF-8/LC_TIME
38
/usr/lib/locale/en_GB.UTF-8/LC_NUMERIC
8
/etc/magic.mgc
...
To focus this summary report on a few files or directories of interest only, such
as
/etc/audit/auditd.conf
,
/etc/pam.d
, and
/etc/sysconfig
,
use a command similar to the following:
aureport -f -i --failed --summary |grep -e "/etc/audit/auditd.conf" -e
"/etc/pam.d/" -e "/etc/sysconfig"
1
/etc/sysconfig/displaymanager
4
From the summary report, then proceed to isolate these items of interest from
the log and find out their event IDs for further analysis:
Setting Up the Linux Audit Framework
419
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......