Audit monitoring
Audit monitoring is a security and compliance feature that
-
integrates with the Linux audit daemon to monitor system events as defined by audit rules
-
writes logs in local log files to record changes in the monitored resources, and
-
allows forwarding of audit logs to a remote syslog server.
Linux audit daemon is a user-space component of the Linux auditing system that
-
tracks and logs system calls, file accesses, user actions, and other events as specified by audit rules, and
-
provides administrators with insights to detect suspicious behavior and maintain system integrity.
An audit rule is a configuration that
-
specifies which files, directories, or system events should be monitored
-
determines the conditions for monitoring, and
-
forms the foundation of an audit logging system.
An audit log is a chronological record that
-
is automatically generated when a monitored event, as defined by an audit rule, occurs, and
-
typically includes details such as the event type, timestamp, user or process involved, and affected resources.
|
Feature name |
Release information |
Feature description |
|---|---|---|
|
Implementing audit monitoring |
Release 25.3.1 |
Introduced in this release on: NCS 5500 fixed port routers; NCS 5700 fixed port routers; NCS 5500 modular routers (NCS 5500 line cards; NCS 5700 line cards [Mode: Compatibility; Native]) You can enhance your router’s security and compliance by enabling audit monitoring. This feature lets you configure predefined rules that enable the router to monitor, log, and optionally forward audit logs to a remote syslog server for centralized analysis and incident response. The feature introduces these changes: CLI: |
Audit rules and audit logs for security monitoring
Administrators define audit rules to track changes to sensitive files, monitor system calls, and observe other critical activities. By customizing audit rules, organizations can align monitoring with their unique security and compliance requirements.
Audit rules establish what to watch, while audit logs capture and document every relevant occurrence, ensuring a complete and actionable history of system activity.
For example, an audit rule that monitors changes to /etc/passwd file creates an audit log entry each time this file is modified.
Feedback