5.3 Monitoring Log Files Flashcards
What are the three aspects to proper log management?
- Ensuring logs are protected through detailed recordings of changes.
- Storing logs for a sufficient amount of time.
- Omitting unnecessary data to avoid excessive and gratuitous logs.
When we properly manage our logs, we are able to better analyze and review them regularly, letting us rapidly pinpoint _________, _________, and __________.
When we properly manage our logs, we are able to better analyze and review them regularly, letting us rapidly pinpoint threats, regulatory violations, and fraudulent activity.
Linux stores all log files in a centralized repository located in _______.
Linux stores all log files in a centralized repository located in /var/log.
Name the log:
Store alerts generated by software being used
by the user, including when it’s launched, how long it’s in use, when it’s closed, etc.
Application logs
Name the log:
Contain information regarding security
related events. E.g., a user succeeds or fails to log onto a host, or tries to install unauthorized software.
Event logs
Name the log:
Contain information related to system
services such as corn jobs and print jobs.
Service logs
Name the log:
Contain information regarding system events such as boot messages, kernel errors, or anything related to the
system hardware.
System log
What are the four categories of logs
- Application
- Event
- Service
- System
_____________ is designed to filter through enormous system logs and return specific results.
journalctl is designed to filter through enormous system logs and return specific results.
_________ is a daemon that can be used for logging
system-wide events and providing information to other tools, and does not provide reader-friendly display of log information.
systemd is a daemon that can be used for logging
system-wide events and providing information to other tools.
_________ collects and stores log information in a structured, indexed format.
journald collects and stores log information in a structured, indexed format.
○ journald is often referred to as systemd-journald
_________ allows us to access the __________ journal and filter out desired information.
journalctl allows us to access the systemd-journald journal and filter out desired information.
What is journalctl syntax?
journalctl [options] [information being filtered]
_________ is designed to filter through enormous system logs and return specific results.
journalctl is designed to filter through enormous system logs and return specific results.
________records log messages from different areas of a Linux system and routes them to the appropriate log in the /var/log directory
rsyslog records log messages from different areas of a Linux system and routes them to the appropriate log in the /var/log directory
Unlike journalctl, rsyslog can ___________________ for individual servers.
Unlike journalctl, rsyslog can filter logs based on different priority levels for individual servers.
__________ is the process of archiving a log once it reaches a specific size or a point in a set schedule, and rotating it out with a new, empty log.
Log rotation is the process of archiving a log once it reaches a specific size or a point in a set schedule, and rotating it out with a new, empty log.
________ is a kernel level subsystem that can watch every system call an application makes.
auditd is a kernel level subsystem that can watch every system call an application makes.
What is ausearch?
Tool designed to query auditd daemon logs based on different search criteria for event-driven log records.
What is aureport
A program that summarizes various types of events.
What is auditctl?
Responsible for configuring the auditd
system. Has the capability to enable or disable auditd systems, load and list rules, and generate status reports.
auditd does not provide any additional security actions, rather it allows us to _______________.
auditd does not provide any additional security actions, rather it allows us to monitor existing violations.
auditd integration with the system kernel allows it to
monitor all system operations, such as _________
and _________.
auditd integration with the system kernel allows it to monitor all system operations, such as network traffic and file system access.