Solved

How do you sort through specific Event IDs in audit logs?

Posted on 2006-11-29
4
510 Views
Last Modified: 2008-01-09
I know the answer is to use ausearch from a command line.  According to the ausearch man entry, the Event ID comes after the ":" in the msg=audit line entry.  As an example, msg=audit(1116360555.329:2401771) would mean that "2401771" is the Event ID.  But in looking though the audit.logs, it seems as if that number is simply a sequential marker.  Also, I've searched the Internet to try and find something more about Linux audit.log files but everything seems to be geared towards Windows Event IDs.

For instance, we would like to be able to see if a user has tried to access a file they are not authorized to open.  What Event ID would that be and how would we use ausearch to look for such events?

Is there a listing somewhere which gives the definitions of each individual Event ID and how to interpret them so that we can sort on specific events rather than having to cull though each 8M audit.log file?
0
Comment
Question by:L3MS
4 Comments
 
LVL 14

Accepted Solution

by:
chris_calabrese earned 63 total points
ID: 18068680
Linux/Unix audit logs do not contain Event IDs in the same sense as Windows logs. That makes them a bit more difficult to parse though, but it also allows them to be more flexible in handling corner cases that the log system designers didn't think about ahead of time.

I haven't worked with Linux kernel audit logs so I can't give any specifics, but typically your best bet will be to write a Perl script that parses through the logs and pulls out the info you're interested in.
0
 
LVL 11

Assisted Solution

by:kblack05
kblack05 earned 62 total points
ID: 18159792
Perhaps you should consider a logging interface such as Splunk, which can help you make MUCH more sense of your log files: http://www.splunk.com/
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now