Talk With an Expert

Suspicious Unix Log File Entries and Reporting Considerations

Suspicious Unix Log File Entries and Reporting Considerations (PDF, 1.77MB)Published: 12 Feb, 2002
Created by:
Cathy Gresham

In my Kickstart paper I covered basic Unix log files with a configuration file that gathered everything. I would like to expand on that and now cover messages found in those log files that would cause concern and require further investigation. My selection to continue on this subject lies in my inability to find comprehensive information that provides direction to administrators, particularly those in federal government, on what messages in log files could require critical attention and reporting.