Gary Winiger wrote:
> ...
>> For example, are there any C2 audit events that collect
>> information like this?
>>     
>
>       We like to call it Solaris Audit, C2 is very last centurary ;-)
>
>       Any how a slight revision to what Jan said.  If all you want
>       is failed login attempts, then all you need in audit_control(4)
>       is naflags:lo.  If you want both successful and failed,
>       then flags:lo is also needed.
>
>       To set things up, you still need to run bsmconv(1M) and reboot.
>       Configure audit_control as noted.  If this is all the audit
>       you're collecting, you could get away without running auditreduce.
>       The command Jan showed will get you just sshd logins.  If you care
>       about all logins/su/screenlocks/... just run praudit to convert
>       the binary to human (un)readable.  If you're looking for just the
>       IP address, praudit -r gets that untranslated.  For IP addresses
>       that can't be mapped to host names, praudit without the -r will
>       just put them out in dot (or colon) form.
>   

So we have event collection courtesy of Solaris Audit (:-) but
what do we have for taking action when said events occur?
Or for that matter, a series of events?

And how would this be done in real time?
It seems that auditd is writing the files but I can't see which
API would be used to read the data it writes?

Darren


Reply via email to