Auditd Configuration Best Practices Logo

Auditd Configuration Best Practices

0
Free
Updated 11 March 2025
Visit Website

The idea of this auditd configuration is to provide a basic configuration that works out-of-the-box on all major Linux distributions, fits most use cases, produces a reasonable amount of log data, covers security-relevant activity, and is easy to read with different sections and many comments. Sources: Gov.uk auditd rules, alphagov/puppet-auditd#1, CentOS 7 hardening, Linux audit repo, Auditd high-performance Linux auditing. Further rules for PCI DSS compliance and NISPOM compliance are available.

FEATURES

SIMILAR TOOLS

Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.

Automate security incident handling and facilitate real-time activities of incident handlers.

Wazuh is an open-source security platform offering unified XDR and SIEM protection for endpoints and cloud workloads, integrating various security functions into a single architecture.

Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.

A DevSecOps command line asset inventory tool

Incident response and digital forensics tool for transforming data sources and logs into graphs.

Incident response and case management solution for efficient incident response and management.

Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.

A PHP based web application for managing postmortems with pluggable features.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved