Last change: 2025-01-10
The lynis command runs a security audit on Linux systems to test for vulnerable packages, security issues, and possible improvements for system hardening.
Last change: 2025-01-10
The lynis command runs a security audit on Linux systems to test for vulnerable packages, security issues, and possible improvements for system hardening.
Last change: 2025-01-06
Collection of articles about the Linux Audit Framework and how one might use this to configure and optimize the auditd configuration and use relevant tools.
Last change: 2025-01-06
The SSH configuration influences the security of your Linux system. This guide helps you to secure your OpenSSH server and client configuration.
Last change: 2025-01-06
Looking to secure your Linux system? This security guide shows you how to perform system hardening and run technical audits to keep it in optimal condition.
Last change: 2025-01-06
What are the differences between technical auditing and vulnerability scanning? While they are close, the focus is definitely different.
Last change: 2025-01-06
This is the technical Linux guide to achieve compliance with the PCI DSS standard. Become compliant, with Linux tips for configuration and auditing.
Last change: 2025-01-06
It can be useful to see the differences between scans of Lynis, especially when running it daily. Learn how to do this with just a few steps
Last change: 2025-01-06
Logging all actions performed by root might be needed for compliance or security. With the help of Linux audit we log all root actions easy in an audit log.
Last change: 2025-01-06
Sometimes time or money is limited. We hunt to find great alternatives to commercial solutions. This time alternatives for the CIS auditing tool CIS-CAT.
Last change: 2025-01-06
The Linux audit framework is a very powerful tool to monitor files, directories, and system calls. Learn how to configure it.
Last change: 2025-01-06
To perform a basic audit of the binaries on your system, we can search for setuid binaries. Finding these setuid binaries is easy with the find command.
Last change: 2025-01-06
Snoopy is a useful utility to log commands on Linux and create a related audit trail. Auditing trails are considered to be important for proper accounting.
Last change: 2025-01-06
Security scanning can be boring and time consuming. In this article we have a look at how simple it can be, when it comes to security scans.
Last change: 2025-01-06
Log files are the precious collection of system events. Still many people don't really use them, until it is really needed. Let's change that!
Last change: 2025-01-06
The term audit may sound more official than it is. This article shows how to perform a security scan of your AIX systems and apply hardening measures.
Last change: 2025-01-06
This article describes the purpose of the audit.log file in /var/log/audit and the relationship with the Linux audit framework.
Last change: 2025-01-06
Quick guide for performing a Unix security audit on a Unix or Linux based system. Under three minutes you have the results and finished the first audit!
Last change: 2025-01-06
When auditing a Linux system, it might be hard to determine what to audit actually. This article will provide some guidance and tips.
Last change: 2025-01-06
Guide to setup central audit logging for your Linux based systems, with the use of the powerful Linux audit framework. No single audit log should get lost!
Last change: 2025-01-06
Guide regarding the aureport utility, including some aureport examples. Aureport helps with audit reports and is part of the Linux audit framework.
Last change: 2025-01-06
Article to deal with the Linux audit log file and how to use it. Including tips to search events and safeguard it against unintended alteration of the log.
Last change: 2025-01-06
Article about Linux / Unix auditing with a focus on the usage of Lynis for auditors. Simplifying the work of the auditor and increasing the quality of work.
Last change: 2025-01-06
Performing a Linux server security audit can be a time consuming process. In this article the most important parts are explained including automation.
Last change: 2025-01-06
This article describes what a security audit is and why or when to use it. System audits also apply to Linux systems as part of technical auditing.
Last change: 2025-01-06
This article provides tips for FreeBSD hardening by using a powerful tool named Lynis. This script will perform an extensive audit to secure your systems.
Last change: 2025-01-06
Guide for auditing Linux systems by using the audit daemon and related utilities. This powerful audit framework has many possibilities for auditing Linux.
Last change: 2025-01-06
Article about a tool within CAATTs for Linux: Lynis. Helping auditors with computer-assisted audit tools and techniques, with focus on Linux and Unix scans.
Last change: 2025-01-06
Article about how to audit and check installed software packages and their security by using the related package managers.
Last change: 2025-01-06
Introduction article into securing Linux based systems by performing a scan with Lynis. After this first audit it will be much easier to harden the system!
Last change: 2025-01-06
This article describes how to audit the network configuration of Unix and Linux based systems, with useful tips for auditors and system administrators.