O'Reilly logo

Mac® OS X Security by Brian Wotring, Preston Norvell, Bruce Potter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Auditing

 

“It depends on what the meaning of the word ‘is’ is.”

 
 --excerpts from Bill Clinton’s Grand Jury testimony

No system or network service is 100% secure. Security is an ongoing process. All the precautions and steps taken during the installation and configuration of an operating system and its services are just the beginning. Routine audits of the system and services are critical. There are many ways to monitor the integrity of a system. An important part of auditing is the correct management and monitoring of log files. Sometimes, the default log settings for a system or service are not sufficient. Even then, log files are of no use unless they are routinely monitored.

The goal of this chapter is to point out the importance ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required