The IDM_open_files modules monitors all open files in specified directories (and their subdirectories):
Files:
/etc/IDM_open_files/expected.local.lsof
/etc/IDM_open_files/expected.<platform>.lsof
local signatures for a particular directory take precedence
over — i.e., override — <platform> signatures.
This example file configures IDM_open_files to monitor two directories, /dev, where intruder-related software if often hidden, and /lib,
#
# -- reg-exps are fine (encouraged) :
#
DIR: "/dev"
initctl
null
ptmx
xconsole
zero
pts\/\d
ttyS\d
tty\d
DIR: "/lib64"
ld-2.3.4.so
lib.*so.*
security\/pam_[a-z0-9]+.so
The configurations given for a particular directory are converted into a regular expression match, for example, for /lib64, as specified above:
$of =~ m/ld-2.3.4.so
|lib.*so.*
|security\/pam_[a-z0-9]+.so/x
Any file found open within /lib64 which does not match this
reg-exp is logged.
| ...previous | up (conts) | next... |