Configure Auditd and how to leverage it
Learn how to config and write rules to detect malicious activities
Last updated
Was this helpful?
Learn how to config and write rules to detect malicious activities
Last updated
Was this helpful?
When I was working as a Security Engineer, my company only used Syslog, and I didn't know whether it is enough logs or not. I noticed most of the SOC center collect auditd log
Auditd is developed by Red Hat so RHEL usually has it built-in so most of the time you just need to enable it and configure its rules, below are all related files and processes of auditd
Let's start with audit.rules which is usually stored at/etc/audit/rules.d
, this file contains all the rules that you will define for Auditd. The rules will look something like this (I'll explain the rules later)
The package manager will depend on your system, mine is ubuntu, and yours may be RHEL or Centos
After that, you can use auditctl to check your configuration (the command will check are there any rules have applied)
By default Syslog does not collect auditd logs, you will have to configure it by changing active = no -> active = yes in this file: /etc/audisp/plugins.d/syslog.conf
and after that restart the service
Also by default Rsyslog does not collect auditd logs, you have to config a little bit more. you go to the /etc/rsyslog.conf and add these line to the config file on the client
Refs: