April 2024
Intermediate to advanced
608 pages
17h 13m
English

Intertwined with the access check process is the auditing process. An administrator can configure the system’s auditing mechanism to generate a log of accessed resources. Each log event will include details about the user and application that opened the resource and whether the access succeeded or failed. This information can help us identify incorrect security settings or detect malicious access to sensitive resources.
In this short chapter, we’ll first discuss where the resource access log gets stored once the kernel generates it. We’ll then describe how a system administrator can configure the audit mechanism. Finally, ...
Read now
Unlock full access