[784] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re[2]: Audit trails

daemon@ATHENA.MIT.EDU (Mark_W_Loveless@smtp.bnr.com)
Sun Dec 1 20:37:17 1996

From: Mark_W_Loveless@smtp.bnr.com
Date: Thu, 28 Nov 96 23:48:59 CST
To: ids@uow.edu.au
Reply-To: ids@uow.edu.au

>> Actually, AIX has quite good auditing features for Unix.  It can include 
>> quite a bit of detail, including what commands a particular user is 
using 
>> and at what time.  Almost noone uses the entire auditing features 
because
>> it gives too much information and can slow the system response time 
noticably.

>True, but if you're trying to watch particular users or areas of the system for
>suspicious activity, such as a hacker, then these sorts of audit trails are 
>just what the doctor ordered.  For the benefit of those of us without access to
>AIX, could you give us a brief description of the sorts of auditing that is 
>available?

Try looking at http://beaver.fu-q.com/nomad/faqs/aix which covers most of the 
basics.

home help back first fref pref prev next nref lref last post