public inbox for linux-audit@redhat.com
 help / color / mirror / Atom feed
* auditctl for admin's accessing other user files
@ 2018-06-25 20:59 Skaggs, Nicholas C
  2018-06-25 21:16 ` Steve Grubb
  2018-06-25 21:28 ` Steve Grubb
  0 siblings, 2 replies; 6+ messages in thread
From: Skaggs, Nicholas C @ 2018-06-25 20:59 UTC (permalink / raw)
  To: linux-audit@redhat.com


[-- Attachment #1.1: Type: text/plain, Size: 1186 bytes --]

Hello
I noticed in the man page for auditctl, an example of how to monitor if admins are accessing other user's files. I created a rule like the one in the example. This is great that it is pulling the action and user calling the action!

The rule
-a always,exit -S all -F dir=/home/username/ -F uid=0 -C auid!=obj_uid

I will pull a report on the findings with
aureport -f -i | grep /home/username/

The report is heavier than anticipated so I tried to make an adjustment to only capture what happens in the directory
-a always,exit -S all -F path=/home/username/ -F uid=0 -C auid!=obj_uid
... but that is returning with  Error sending add rule data request (Invalid argument)

I then tried the below rule; it does not return an error upon add, but when I do an auditctl -l there are no rules listed
-a always,exit -S all -F path=/home/username/ -p=rwxa -F uid=0 -C auid!=obj_uid

Is there a preferred  way to set the rule, maybe on the inode of the directory, but does not lose the ability to see if an admin is doing it and what action?  I have been adding these on the fly, instead of adding to the /etc/audit/audit.rules file, for now.


Thanks!
Nick Skaggs


[-- Attachment #1.2: Type: text/html, Size: 6027 bytes --]

[-- Attachment #2: Type: text/plain, Size: 0 bytes --]



^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2018-06-30 13:33 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-06-25 20:59 auditctl for admin's accessing other user files Skaggs, Nicholas C
2018-06-25 21:16 ` Steve Grubb
2018-06-26 13:22   ` Skaggs, Nicholas C
2018-06-25 21:28 ` Steve Grubb
2018-06-30  2:44   ` warron.french
2018-06-30 13:33     ` Steve Grubb

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox