audit.8 (155290) | audit.8 (155364) |
---|---|
1.\" Copyright (c) 2004 Apple Computer, Inc. 2.\" All rights reserved. 3.\" 4.\" @APPLE_BSD_LICENSE_HEADER_START@ 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 15 unchanged lines hidden (view full) --- 24.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 25.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND 26.\" ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 27.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 28.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29.\" 30.\" @APPLE_BSD_LICENSE_HEADER_END@ 31.\" | 1.\" Copyright (c) 2004 Apple Computer, Inc. 2.\" All rights reserved. 3.\" 4.\" @APPLE_BSD_LICENSE_HEADER_START@ 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 15 unchanged lines hidden (view full) --- 24.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 25.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND 26.\" ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 27.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 28.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29.\" 30.\" @APPLE_BSD_LICENSE_HEADER_END@ 31.\" |
32.\" $P4: //depot/projects/trustedbsd/openbsm/bin/audit/audit.8#4 $ | 32.\" $P4: //depot/projects/trustedbsd/openbsm/bin/audit/audit.8#6 $ |
33.\" | 33.\" |
34.Dd Jan 24, 2004 | 34.Dd January 24, 2004 |
35.Dt AUDIT 8 36.Os 37.Sh NAME 38.Nm audit 39.Nd audit management utility 40.Sh SYNOPSIS 41.Nm audit 42.Op Fl nst 43.Op Ar file 44.Sh DESCRIPTION 45The 46.Nm 47utility controls the state of the audit system. 48The optional 49.Ar file 50operand specifies the location of the audit control input file (default | 35.Dt AUDIT 8 36.Os 37.Sh NAME 38.Nm audit 39.Nd audit management utility 40.Sh SYNOPSIS 41.Nm audit 42.Op Fl nst 43.Op Ar file 44.Sh DESCRIPTION 45The 46.Nm 47utility controls the state of the audit system. 48The optional 49.Ar file 50operand specifies the location of the audit control input file (default |
51.Pa /etc/security/audit_control ). | 51.Pa /etc/security/audit_control ) . |
52.Pp 53The options are as follows: 54.Bl -tag -width Ds 55.It Fl n 56Forces the audit system to close the existing audit log file and rotate to 57a new log file in a location specified in the audit control file. 58.It Fl s 59Specifies that the audit system should [re]synchronize its 60configuration from the audit control file. 61A new log file will be created. 62.It Fl t 63Specifies that the audit system should terminate. 64Log files are closed 65and renamed to indicate the time of the shutdown. 66.El 67.Sh NOTES | 52.Pp 53The options are as follows: 54.Bl -tag -width Ds 55.It Fl n 56Forces the audit system to close the existing audit log file and rotate to 57a new log file in a location specified in the audit control file. 58.It Fl s 59Specifies that the audit system should [re]synchronize its 60configuration from the audit control file. 61A new log file will be created. 62.It Fl t 63Specifies that the audit system should terminate. 64Log files are closed 65and renamed to indicate the time of the shutdown. 66.El 67.Sh NOTES |
68The auditd(8) daemon must already be running. | 68The 69.Xr auditd 8 70daemon must already be running. |
69.Sh FILES 70.Bl -tag -width "/etc/security/audit_control" -compact 71.It Pa /etc/security/audit_control 72Default audit policy file used to configure the auditing system. 73.El 74.Sh SEE ALSO | 71.Sh FILES 72.Bl -tag -width "/etc/security/audit_control" -compact 73.It Pa /etc/security/audit_control 74Default audit policy file used to configure the auditing system. 75.El 76.Sh SEE ALSO |
77.Xr audit_control 5 , |
|
75.Xr auditd 8 | 78.Xr auditd 8 |
76.Xr audit_control 5 | |
77.Sh AUTHORS 78This software was created by McAfee Research, the security research division 79of McAfee, Inc., under contract to Apple Computer Inc. 80Additional authors include Wayne Salamon, Robert Watson, and SPARTA Inc. 81.Pp 82The Basic Security Module (BSM) interface to audit records and audit event 83stream format were defined by Sun Microsystems. 84.Sh HISTORY 85The OpenBSM implementation was created by McAfee Research, the security 86division of McAfee Inc., under contract to Apple Computer Inc. in 2004. 87It was subsequently adopted by the TrustedBSD Project as the foundation for 88the OpenBSM distribution. | 79.Sh AUTHORS 80This software was created by McAfee Research, the security research division 81of McAfee, Inc., under contract to Apple Computer Inc. 82Additional authors include Wayne Salamon, Robert Watson, and SPARTA Inc. 83.Pp 84The Basic Security Module (BSM) interface to audit records and audit event 85stream format were defined by Sun Microsystems. 86.Sh HISTORY 87The OpenBSM implementation was created by McAfee Research, the security 88division of McAfee Inc., under contract to Apple Computer Inc. in 2004. 89It was subsequently adopted by the TrustedBSD Project as the foundation for 90the OpenBSM distribution. |