Audit monitoring
Audit monitoring is a security and compliance feature that
-
integrates with the Linux audit daemon to monitor system events as defined by audit rules
-
writes logs in local log files to record changes in the monitored resources, and
-
allows forwarding of audit logs to a remote syslog server.
Linux audit daemon is a user-space component of the Linux auditing system that
-
tracks and logs system calls, file accesses, user actions, and other events as specified by audit rules, and
-
provides administrators with insights to detect suspicious behavior and maintain system integrity.
An audit rule is a router configuration that
-
specifies which files, directories, or system events should be monitored, and
-
can be activated on the router by enabling their respective audit rule-groups.
An audit rule-group is a collection of predefined audit rules that
-
can be enabled or disabled together as a single unit, and
-
allows monitoring specific categories of system events, files, or directories, such as changes in user group configuration files, DNS client files, or XR software
|
Feature name |
Release information |
Feature description |
|---|---|---|
|
Implementing audit monitoring |
Release 25.3.1 |
Introduced in this release on: Fixed Systems (8200 [ASIC: Q100, Q200, P100], 8700 [ASIC: P100, K100], 8010 [ASIC: A100]); Centralized Systems (8600 [ASIC:Q200]) ; Modular Systems (8800 [LC ASIC: Q100, Q200, P100]) You can enhance your router’s security and compliance by enabling audit monitoring. This feature lets you configure predefined rules that enable the router to monitor, log, and optionally forward audit logs to a remote syslog server for centralized analysis and incident response. The feature introduces these changes: CLI: |
Audit logs for security monitoring
Network administrators enable audit rule-groups to track changes to sensitive files, monitor system calls, and observe other critical activities.
Audit rules establish what to watch, while audit logs capture and document every relevant occurrence, ensuring a complete and actionable history of system activity.
For example, an audit rule that monitors changes to /etc/passwd file creates an audit log entry each time this file is modified.
Feedback