Deleted Added
full compact
audit.8 (155290) audit.8 (155364)
1.\" Copyright (c) 2004 Apple Computer, Inc.
2.\" All rights reserved.
3.\"
4.\" @APPLE_BSD_LICENSE_HEADER_START@
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:

--- 15 unchanged lines hidden (view full) ---

24.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
25.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
26.\" ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29.\"
30.\" @APPLE_BSD_LICENSE_HEADER_END@
31.\"
1.\" Copyright (c) 2004 Apple Computer, Inc.
2.\" All rights reserved.
3.\"
4.\" @APPLE_BSD_LICENSE_HEADER_START@
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:

--- 15 unchanged lines hidden (view full) ---

24.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
25.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
26.\" ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29.\"
30.\" @APPLE_BSD_LICENSE_HEADER_END@
31.\"
32.\" $P4: //depot/projects/trustedbsd/openbsm/bin/audit/audit.8#4 $
32.\" $P4: //depot/projects/trustedbsd/openbsm/bin/audit/audit.8#6 $
33.\"
33.\"
34.Dd Jan 24, 2004
34.Dd January 24, 2004
35.Dt AUDIT 8
36.Os
37.Sh NAME
38.Nm audit
39.Nd audit management utility
40.Sh SYNOPSIS
41.Nm audit
42.Op Fl nst
43.Op Ar file
44.Sh DESCRIPTION
45The
46.Nm
47utility controls the state of the audit system.
48The optional
49.Ar file
50operand specifies the location of the audit control input file (default
35.Dt AUDIT 8
36.Os
37.Sh NAME
38.Nm audit
39.Nd audit management utility
40.Sh SYNOPSIS
41.Nm audit
42.Op Fl nst
43.Op Ar file
44.Sh DESCRIPTION
45The
46.Nm
47utility controls the state of the audit system.
48The optional
49.Ar file
50operand specifies the location of the audit control input file (default
51.Pa /etc/security/audit_control ).
51.Pa /etc/security/audit_control ) .
52.Pp
53The options are as follows:
54.Bl -tag -width Ds
55.It Fl n
56Forces the audit system to close the existing audit log file and rotate to
57a new log file in a location specified in the audit control file.
58.It Fl s
59Specifies that the audit system should [re]synchronize its
60configuration from the audit control file.
61A new log file will be created.
62.It Fl t
63Specifies that the audit system should terminate.
64Log files are closed
65and renamed to indicate the time of the shutdown.
66.El
67.Sh NOTES
52.Pp
53The options are as follows:
54.Bl -tag -width Ds
55.It Fl n
56Forces the audit system to close the existing audit log file and rotate to
57a new log file in a location specified in the audit control file.
58.It Fl s
59Specifies that the audit system should [re]synchronize its
60configuration from the audit control file.
61A new log file will be created.
62.It Fl t
63Specifies that the audit system should terminate.
64Log files are closed
65and renamed to indicate the time of the shutdown.
66.El
67.Sh NOTES
68The auditd(8) daemon must already be running.
68The
69.Xr auditd 8
70daemon must already be running.
69.Sh FILES
70.Bl -tag -width "/etc/security/audit_control" -compact
71.It Pa /etc/security/audit_control
72Default audit policy file used to configure the auditing system.
73.El
74.Sh SEE ALSO
71.Sh FILES
72.Bl -tag -width "/etc/security/audit_control" -compact
73.It Pa /etc/security/audit_control
74Default audit policy file used to configure the auditing system.
75.El
76.Sh SEE ALSO
77.Xr audit_control 5 ,
75.Xr auditd 8
78.Xr auditd 8
76.Xr audit_control 5
77.Sh AUTHORS
78This software was created by McAfee Research, the security research division
79of McAfee, Inc., under contract to Apple Computer Inc.
80Additional authors include Wayne Salamon, Robert Watson, and SPARTA Inc.
81.Pp
82The Basic Security Module (BSM) interface to audit records and audit event
83stream format were defined by Sun Microsystems.
84.Sh HISTORY
85The OpenBSM implementation was created by McAfee Research, the security
86division of McAfee Inc., under contract to Apple Computer Inc. in 2004.
87It was subsequently adopted by the TrustedBSD Project as the foundation for
88the OpenBSM distribution.
79.Sh AUTHORS
80This software was created by McAfee Research, the security research division
81of McAfee, Inc., under contract to Apple Computer Inc.
82Additional authors include Wayne Salamon, Robert Watson, and SPARTA Inc.
83.Pp
84The Basic Security Module (BSM) interface to audit records and audit event
85stream format were defined by Sun Microsystems.
86.Sh HISTORY
87The OpenBSM implementation was created by McAfee Research, the security
88division of McAfee Inc., under contract to Apple Computer Inc. in 2004.
89It was subsequently adopted by the TrustedBSD Project as the foundation for
90the OpenBSM distribution.