27.4
Configuring and Using the AppArmor Desktop Monitor Applet . . . . .
353
27.5
Reacting to Security Event Rejections . . . . . . . . . . . . . . . .
354
27.6
Maintaining Your Security Profiles . . . . . . . . . . . . . . . . .
354
2 8 Support
357
28.1
Updating Novell AppArmor Online . . . . . . . . . . . . . . . . .
357
28.2
Using the Man Pages . . . . . . . . . . . . . . . . . . . . . . .
357
28.3
For More Information . . . . . . . . . . . . . . . . . . . . . .
359
28.4
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . .
360
28.5
Reporting Bugs for AppArmor . . . . . . . . . . . . . . . . . . .
367
2 9 AppArmor Glossary
369
Part V
The Linux Audit Framework
373
3 0 Understanding Linux Audit
375
30.1
Introducing the Components of Linux Audit . . . . . . . . . . . . .
378
30.2
Configuring the Audit Daemon . . . . . . . . . . . . . . . . . . .
379
30.3
Controlling the Audit System Using auditctl . . . . . . . . . . . . .
385
30.4
Passing Parameters to the Audit System . . . . . . . . . . . . . . .
387
30.5
Understanding the Audit Logs and Generating Reports . . . . . . . . .
391
30.6
Querying the Audit Daemon Logs with ausearch . . . . . . . . . . .
403
30.7
Analyzing Processes with autrace . . . . . . . . . . . . . . . . . .
407
30.8
Visualizing Audit Data . . . . . . . . . . . . . . . . . . . . . .
408
3 1 Setting Up the Linux Audit Framework
411
31.1
Determining the Components to Audit . . . . . . . . . . . . . . .
412
31.2
Configuring the Audit Daemon . . . . . . . . . . . . . . . . . . .
413
31.3
Enabling Audit for System Calls . . . . . . . . . . . . . . . . . .
414
31.4
Setting Up Audit Rules . . . . . . . . . . . . . . . . . . . . . .
415
31.5
Configuring Audit Reports . . . . . . . . . . . . . . . . . . . . .
417
31.6
Configuring Log Visualization . . . . . . . . . . . . . . . . . . .
420
3 2 Introducing an Audit Rule Set
423
32.1
Adding Basic Audit Configuration Parameters . . . . . . . . . . . .
424
32.2
Adding Watches on Audit Log Files and Configuration Files . . . . . . .
425
32.3
Monitoring File System Objects . . . . . . . . . . . . . . . . . .
426
32.4
Monitoring Security Configuration Files and Databases . . . . . . . . .
427
32.5
Monitoring Miscellaneous System Calls . . . . . . . . . . . . . . .
430
32.6
Filtering System Call Arguments . . . . . . . . . . . . . . . . . .
430
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......