From the course: Linux: System Maintenance

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Security logs

Security logs - Linux Tutorial

From the course: Linux: System Maintenance

Start my 1-month free trial

Security logs

- [Instructor] The security log contains information about security events that happen on the system. Requests for authentication through SSH commands issued using sudo and information from authentication modules are all logged here so they can be reviewed by the administrator. Here on CentOS the security log is at /var/log/secure and on Ubuntu, it's at /var/log/auth.log. To take a look at it, I'll write sudo cat /var/log/secure. If you're using a system connected directly to the internet you're likely to see a lot of login attempts from malicious bots around the internet. As long as your services, especially SSH are configured in a secure way with root login disabled, password login disabled and requiring a key to log in this isn't really a problem. You can think of it as the dull roar of background noise on the internet or like a car thief walking down the street testing out doors just to see if somebody left their car unlocked. All these login attempts don't mean your system has…

Contents