{"id":176178,"date":"2025-01-10T08:59:12","date_gmt":"2025-01-10T07:59:12","guid":{"rendered":"https:\/\/glosarix.com\/glossary\/auditd-en\/"},"modified":"2025-03-07T23:24:52","modified_gmt":"2025-03-07T22:24:52","slug":"auditd-en","status":"publish","type":"glossary","link":"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/","title":{"rendered":"Auditd"},"content":{"rendered":"<p>Description: Auditd is the user space component of the Linux Audit System, designed to log system events and provide a robust framework for security auditing. This tool allows system administrators to monitor and log specific activities on the system, such as file accesses, configuration changes, and command executions. Auditd integrates with the Linux kernel to capture security events and generate detailed logs that can be analyzed later. Its configuration is highly customizable, allowing users to define which events they want to audit and how they should be logged. Additionally, Auditd is essential for compliance with security and auditing regulations, as it provides complete traceability of actions performed on the system. Its ability to generate reports and real-time alerts makes it an essential tool for security management in enterprise and critical environments.<\/p>\n<p>History: Auditd was introduced into the Linux kernel in 2001 as part of the effort to enhance security and auditing in Linux-based operating systems. Since its inception, it has evolved to include more advanced features and better integration with other security tools. Over the years, it has become a standard in many Linux distributions, especially in enterprise environments where security auditing is crucial.<\/p>\n<p>Uses: Auditd is primarily used to log security events on Linux systems, allowing administrators to monitor suspicious or unauthorized activities. It is commonly employed in compliance audits, where detailed records of user and system actions are required. It is also used for digital forensic investigations, helping to identify and analyze security incidents.<\/p>\n<p>Examples: A practical example of using Auditd is its implementation on a web server, where it is configured to log access to critical files and changes to the server configuration. This allows administrators to detect unauthorized access or malicious modifications. Another case is in compliance environments, where actions of privileged users are audited to ensure that established security policies are followed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: Auditd is the user space component of the Linux Audit System, designed to log system events and provide a robust framework for security auditing. This tool allows system administrators to monitor and log specific activities on the system, such as file accesses, configuration changes, and command executions. Auditd integrates with the Linux kernel to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"glossary-categories":[11472],"glossary-tags":[12428],"glossary-languages":[],"class_list":["post-176178","glossary","type-glossary","status-publish","hentry","glossary-categories-red-hat-enterprise-linux-en","glossary-tags-red-hat-enterprise-linux-en"],"post_title":"Auditd ","post_content":"Description: Auditd is the user space component of the Linux Audit System, designed to log system events and provide a robust framework for security auditing. This tool allows system administrators to monitor and log specific activities on the system, such as file accesses, configuration changes, and command executions. Auditd integrates with the Linux kernel to capture security events and generate detailed logs that can be analyzed later. Its configuration is highly customizable, allowing users to define which events they want to audit and how they should be logged. Additionally, Auditd is essential for compliance with security and auditing regulations, as it provides complete traceability of actions performed on the system. Its ability to generate reports and real-time alerts makes it an essential tool for security management in enterprise and critical environments.\n\nHistory: Auditd was introduced into the Linux kernel in 2001 as part of the effort to enhance security and auditing in Linux-based operating systems. Since its inception, it has evolved to include more advanced features and better integration with other security tools. Over the years, it has become a standard in many Linux distributions, especially in enterprise environments where security auditing is crucial.\n\nUses: Auditd is primarily used to log security events on Linux systems, allowing administrators to monitor suspicious or unauthorized activities. It is commonly employed in compliance audits, where detailed records of user and system actions are required. It is also used for digital forensic investigations, helping to identify and analyze security incidents.\n\nExamples: A practical example of using Auditd is its implementation on a web server, where it is configured to log access to critical files and changes to the server configuration. This allows administrators to detect unauthorized access or malicious modifications. Another case is in compliance environments, where actions of privileged users are audited to ensure that established security policies are followed.","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Auditd - Glosarix<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Auditd - Glosarix\" \/>\n<meta property=\"og:description\" content=\"Description: Auditd is the user space component of the Linux Audit System, designed to log system events and provide a robust framework for security auditing. This tool allows system administrators to monitor and log specific activities on the system, such as file accesses, configuration changes, and command executions. Auditd integrates with the Linux kernel to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/\" \/>\n<meta property=\"og:site_name\" content=\"Glosarix\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-07T22:24:52+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GlosarixOficial\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/\",\"url\":\"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/\",\"name\":\"Auditd - Glosarix\",\"isPartOf\":{\"@id\":\"https:\/\/glosarix.com\/en\/#website\"},\"datePublished\":\"2025-01-10T07:59:12+00:00\",\"dateModified\":\"2025-03-07T22:24:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/glosarix.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Auditd\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/glosarix.com\/en\/#website\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"name\":\"Glosarix\",\"description\":\"T\u00e9rminos tecnol\u00f3gicos - Glosarix\",\"publisher\":{\"@id\":\"https:\/\/glosarix.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/glosarix.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/glosarix.com\/en\/#organization\",\"name\":\"Glosarix\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"contentUrl\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"width\":192,\"height\":192,\"caption\":\"Glosarix\"},\"image\":{\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/GlosarixOficial\",\"https:\/\/www.instagram.com\/glosarixoficial\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Auditd - Glosarix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/","og_locale":"en_US","og_type":"article","og_title":"Auditd - Glosarix","og_description":"Description: Auditd is the user space component of the Linux Audit System, designed to log system events and provide a robust framework for security auditing. This tool allows system administrators to monitor and log specific activities on the system, such as file accesses, configuration changes, and command executions. Auditd integrates with the Linux kernel to [&hellip;]","og_url":"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/","og_site_name":"Glosarix","article_modified_time":"2025-03-07T22:24:52+00:00","twitter_card":"summary_large_image","twitter_site":"@GlosarixOficial","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/","url":"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/","name":"Auditd - Glosarix","isPartOf":{"@id":"https:\/\/glosarix.com\/en\/#website"},"datePublished":"2025-01-10T07:59:12+00:00","dateModified":"2025-03-07T22:24:52+00:00","breadcrumb":{"@id":"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/glosarix.com\/en\/glossary\/auditd-en\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/glosarix.com\/en\/glossary\/auditd-en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/glosarix.com\/en\/"},{"@type":"ListItem","position":2,"name":"Auditd"}]},{"@type":"WebSite","@id":"https:\/\/glosarix.com\/en\/#website","url":"https:\/\/glosarix.com\/en\/","name":"Glosarix","description":"T\u00e9rminos tecnol\u00f3gicos - Glosarix","publisher":{"@id":"https:\/\/glosarix.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/glosarix.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/glosarix.com\/en\/#organization","name":"Glosarix","url":"https:\/\/glosarix.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","contentUrl":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","width":192,"height":192,"caption":"Glosarix"},"image":{"@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/GlosarixOficial","https:\/\/www.instagram.com\/glosarixoficial\/"]}]}},"_links":{"self":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/176178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/comments?post=176178"}],"version-history":[{"count":0,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/176178\/revisions"}],"wp:attachment":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/media?parent=176178"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-categories?post=176178"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-tags?post=176178"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-languages?post=176178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}