Contents:


About this document

4. Log Monitoring Utilities

Manually watching these logs is frankly unintesting and time-consuming. Many utilities exist which automatically scan logs for signatures of suspicious events. These include:

Each is easily installed and configured. Reports are periodically emailed to the system administrator.

Output from log-watching utilities should be sent to a remote machine to minimise the risk of an intruder tampering with the reports, for example, LogWatch can be configured to do this --- see /etc/log.d/logwatch.conf for details.


...previousup (conts)next...