Question - Rule Syntax

Trevor Vaughan peiriannydd at gmail.com
Thu Dec 29 14:10:24 UTC 2011


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm hoping to be told otherwise, but the cleanest and most maintainable way that I've seen to do this is to make two rules.

First Rule: Ignore user 505
Second Rule: Audit everyone

Auditd should stop at the first rule matched. It does add more rules but seems to be the most stable across auditd versions.

Also, that auid!=42... should probably be near the top of your rules since it will get hit the most and I'm assuming that you don't ever want to audit
anonymous accesses to most items.

Trevor

On 12/22/2011 04:19 PM, Bryan Jacobs wrote:
> All,
> 
> New auditd list member here.  I just started playing around with auditd. I was wondering if someone might be kind enough to answer a question I have.
> I am attempting to create a rule that will audit privileged commands for UID's greater than 500 but ignore one particular user that falls under this
> rule.  The user I am trying to ignore is the only user that should be touching the file.
> 
> Below is the rule.
> 
> #### BEGIN RULE SNIP ####
> 
> ## Ensure auditd Collects Information on the Use of Privileged Commands
> 
> -a always,exit -F path=/opt/varonis1.6.0106/bin/ls -F perm=x -F
> auid>=500 -F auid!=4294967295 -F auid!=505 -k privileged
> 
> #### END RULE SNIP ####
> 
> Is the rule syntax above correct?  If not how would I audit all users with UID above 500 but still ignore one particular user?
> 
> 
> Thank you and happy holidays,
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iQEcBAEBAgAGBQJO/HTQAAoJECNCGV1OLcyphzYH/3CayBkrfX8CexuW8SMgCXLs
z+3zwug1DMdz6l4mfrp60TfVGL8scteqOjgHP/1hDp+TNwP2YyXxqAeN+XOAePIU
Gekd3QrOc4bCVhBuHF4719SWkEXQ4Gur1DYLAXO/J9p23dWlT4AE+ehAXonq/F40
quGWuIHCLui8KDvwigrYMr6qZeBbu47leTFvHUakqgDCUwXibR7vXUPHYPuO0A2V
p8sHq535nGzLjB6XLk4PWhRVb/JhXBrCy9iA3ONM1ReT0JaEtB0Liukui6Wbq627
fh7/+kQFXRSB7QGHaFZr+FQp6LkwP+2iqC1JBnVc3/pm58q1DRh46e0m9jvPCDc=
=xLIO
-----END PGP SIGNATURE-----




More information about the Linux-audit mailing list