Deleted Added
full compact
audit.8 (185573) audit.8 (186647)
1.\" Copyright (c) 2004 Apple Inc.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\"
8.\" 1. Redistributions of source code must retain the above copyright

--- 11 unchanged lines hidden (view full) ---

20.\" DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY
21.\" DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
22.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
23.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
24.\" ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27.\"
1.\" Copyright (c) 2004 Apple Inc.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\"
8.\" 1. Redistributions of source code must retain the above copyright

--- 11 unchanged lines hidden (view full) ---

20.\" DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY
21.\" DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
22.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
23.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
24.\" ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27.\"
28.\" $P4: //depot/projects/trustedbsd/openbsm/bin/audit/audit.8#11 $
28.\" $P4: //depot/projects/trustedbsd/openbsm/bin/audit/audit.8#13 $
29.\"
29.\"
30.Dd October 2, 2006
30.Dd December 11, 2008
31.Dt AUDIT 8
32.Os
33.Sh NAME
34.Nm audit
35.Nd audit management utility
36.Sh SYNOPSIS
37.Nm
31.Dt AUDIT 8
32.Os
33.Sh NAME
34.Nm audit
35.Nd audit management utility
36.Sh SYNOPSIS
37.Nm
38.Fl n | s | t
38.Fl i | n | s | t
39.Sh DESCRIPTION
40The
41.Nm
42utility controls the state of the audit system.
43One of the following flags is required as an argument to
44.Nm :
45.Bl -tag -width indent
39.Sh DESCRIPTION
40The
41.Nm
42utility controls the state of the audit system.
43One of the following flags is required as an argument to
44.Nm :
45.Bl -tag -width indent
46.It Fl i
47Initializes and starts auditing.
48This option is currently for Mac OS X only
49and requires
50.Xr auditd 8
51to be configured to run under
52.Xr launchd 8 .
46.It Fl n
47Forces the audit system to close the existing audit log file and rotate to
48a new log file in a location specified in the audit control file.
49.It Fl s
50Specifies that the audit system should [re]synchronize its
51configuration from the audit control file.
52A new log file will be created.
53.It Fl t
54Specifies that the audit system should terminate.
55Log files are closed
56and renamed to indicate the time of the shutdown.
57.El
58.Sh NOTES
59The
60.Xr auditd 8
61daemon must already be running.
53.It Fl n
54Forces the audit system to close the existing audit log file and rotate to
55a new log file in a location specified in the audit control file.
56.It Fl s
57Specifies that the audit system should [re]synchronize its
58configuration from the audit control file.
59A new log file will be created.
60.It Fl t
61Specifies that the audit system should terminate.
62Log files are closed
63and renamed to indicate the time of the shutdown.
64.El
65.Sh NOTES
66The
67.Xr auditd 8
68daemon must already be running.
69Optionally, it can be configured to be started
70on-demand by
71.Xr launchd 8
72(Mac OS X only).
73The
74.Nm
75utility requires audit administrator privileges for successful operation.
62.Sh FILES
63.Bl -tag -width ".Pa /etc/security/audit_control" -compact
64.It Pa /etc/security/audit_control
65Audit policy file used to configure the auditing system.
66.El
67.Sh SEE ALSO
68.Xr audit 4 ,
69.Xr audit_control 5 ,
76.Sh FILES
77.Bl -tag -width ".Pa /etc/security/audit_control" -compact
78.It Pa /etc/security/audit_control
79Audit policy file used to configure the auditing system.
80.El
81.Sh SEE ALSO
82.Xr audit 4 ,
83.Xr audit_control 5 ,
70.Xr auditd 8
84.Xr auditd 8 ,
85.Xr launchd 8
71.Sh HISTORY
72The OpenBSM implementation was created by McAfee Research, the security
73division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
74It was subsequently adopted by the TrustedBSD Project as the foundation for
75the OpenBSM distribution.
76.Sh AUTHORS
77.An -nosplit
78This software was created by McAfee Research, the security research division
79of McAfee, Inc., under contract to Apple Computer Inc.
80Additional authors include
81.An Wayne Salamon ,
82.An Robert Watson ,
83and SPARTA Inc.
84.Pp
85The Basic Security Module (BSM) interface to audit records and audit event
86stream format were defined by Sun Microsystems.
86.Sh HISTORY
87The OpenBSM implementation was created by McAfee Research, the security
88division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004.
89It was subsequently adopted by the TrustedBSD Project as the foundation for
90the OpenBSM distribution.
91.Sh AUTHORS
92.An -nosplit
93This software was created by McAfee Research, the security research division
94of McAfee, Inc., under contract to Apple Computer Inc.
95Additional authors include
96.An Wayne Salamon ,
97.An Robert Watson ,
98and SPARTA Inc.
99.Pp
100The Basic Security Module (BSM) interface to audit records and audit event
101stream format were defined by Sun Microsystems.