A variety of methods exist for auditing user activity in UNIX and Linux environments. This whitepaper looks at the 5 most popular methods for auditing. Each method is described, along with actionable tips for how to make the best use of each method. In addition, guidance is provided to show what type of auditing each method is best suited for.
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Whitepaper: User Audit Options for Linux and Solaris
1. WHITEPAPER
Options for User Auditing on
Linux and Solaris Platforms
Cyril Plisko, CTO of Grigale Ltd.
January 2012
Like a Security Camera on Your Servers!