From the course: Linux: System Maintenance
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Security logs - Linux Tutorial
From the course: Linux: System Maintenance
Security logs
- [Instructor] The security log contains information about security events that happen on the system. Requests for authentication through SSH commands issued using sudo and information from authentication modules are all logged here so they can be reviewed by the administrator. Here on CentOS the security log is at /var/log/secure and on Ubuntu, it's at /var/log/auth.log. To take a look at it, I'll write sudo cat /var/log/secure. If you're using a system connected directly to the internet you're likely to see a lot of login attempts from malicious bots around the internet. As long as your services, especially SSH are configured in a secure way with root login disabled, password login disabled and requiring a key to log in this isn't really a problem. You can think of it as the dull roar of background noise on the internet or like a car thief walking down the street testing out doors just to see if somebody left their car unlocked. All these login attempts don't mean your system has…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Explore load and uptime4m 3s
-
(Locked)
System logs4m 22s
-
(Locked)
Security logs2m 17s
-
(Locked)
Audit security access, groups, and users3m 24s
-
(Locked)
Check memory and process status3m 24s
-
(Locked)
Explore system resource usage with top6m 55s
-
(Locked)
Check free disk space1m 51s
-
(Locked)
Check disk status3m
-
-
-
-