auditctl -D
No rules
autrace /usr/bin/less /etc/sysconfig/auditd
Waiting to execute: /usr/bin/less
Cleaning up...
No rules
Trace complete. You can locate the records with 'ausearch -i -p 7642'
Always use the full path to the executable to track with autrace. After the trace is
complete, autrace provides the event ID of the trace, so you can analyze the entire data
trail with ausearch. To restore the audit system to use the audit rule set again, just restart
the audit daemon with
rcauditd restart
.
30.8 Visualizing Audit Data
Neither the data trail in
/var/log/audit/audit.log
nor the different report
types generated by aureport, described in
Section 30.5.2, “Generating Custom Audit
Reports”
(page 397), provide an intuitive reading experience to the user. The aureport
output is formatted in columns and thus easily available to any sed, perl, or awk scripts
that users might connect to the audit framework to visualize the audit data.
The visualization scripts (see
Section 31.6, “Configuring Log Visualization”
(page 420)
are one example of how to use standard Linux tools available with SUSE Linux Enter-
prise Server or any other Linux distribution to create easy-to-read audit output. The
following examples help you understand how the plain audit reports can be transformed
into human readable graphics.
The first example illustrates the relationship of programs and system calls. To get to
this kind of data, you need to determine the appropriate
aureport
command that
delivers the source data from which to generate the final graphic:
aureport -s -i
Syscall Report
=======================================
# date time syscall pid comm auid event
=======================================
1. 16/02/09 17:45:01 open 20343 cron unset 2279
2. 16/02/09 17:45:02 mkdir 20350 mktemp root 2284
408
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......