Difference between revisions of "Auditd"
Jump to navigation
Jump to search
(5 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
https://izyknows.medium.com/linux-auditd-for-threat-detection-d06c8b941505 |
https://izyknows.medium.com/linux-auditd-for-threat-detection-d06c8b941505 |
||
+ | https://izyknows.medium.com/linux-auditd-for-threat-hunting-part-2-c75500f591e8 |
||
+ | |||
+ | https://izyknows.medium.com/linux-auditd-for-threat-detection-final-9d5173706b3f |
||
+ | |||
+ | https://documentation.suse.com/sles/12-SP5/html/SLES-all/cha-audit-scenarios.html |
||
+ | |||
+ | https://www.ucartz.com/clients/knowledgebase/1189/How-to-exclude-a-fileordirectory-from-auditd-rules.html |
||
+ | |||
+ | https://www.redhat.com/sysadmin/configure-linux-auditing-auditd |
||
+ | |||
+ | https://archive.is/NGly4 |
||
+ | |||
+ | aureport -x |
||
+ | |||
+ | {{Auditd}} |
||
{{Draft}} |
{{Draft}} |
||
− | {{Linux}} |
Latest revision as of 08:29, 21 July 2024
https://izyknows.medium.com/linux-auditd-for-threat-detection-d06c8b941505
https://izyknows.medium.com/linux-auditd-for-threat-hunting-part-2-c75500f591e8
https://izyknows.medium.com/linux-auditd-for-threat-detection-final-9d5173706b3f
https://documentation.suse.com/sles/12-SP5/html/SLES-all/cha-audit-scenarios.html
https://www.redhat.com/sysadmin/configure-linux-auditing-auditd
aureport -x
This is a draft article and so will not be published on A Voice for Men or appear in random article selections. Wiki4Men is looking for trustworthy editors that can turn draft articles in to featured articles. Information on how to apply is on the Main Page.