auditd Audit Logs (audit.log)
LinuxAuthentication & AccessDisk ImageSIEM / Log Aggregator
Location
/var/log/audit/audit.log (or /var/log/audit/audit.log.*)Description
Linux Audit daemon logs capturing kernel-level audit events configured via audit rules. Records EXECVE (command execution with full arguments), SYSCALL events, file access (PATH), user authentication (USER_AUTH), and privilege changes.
Forensic Value
auditd provides the most granular Linux visibility available. EXECVE records capture every command executed with full arguments even when shell history is cleared or bypassed. SYSCALL events record file opens, network connections, and privilege changes at the kernel level. The audit trail is tamper-resistant when configured to write to remote syslog. aureport and ausearch enable efficient filtering by event type, user, and timeframe.
Tools Required
aureportausearchgrepSIEM (Splunk, Elastic)
Collection Commands
tar
tar czf /forensics/output/audit_logs.tar.gz /var/log/audit/
aureport
aureport --summary > /forensics/output/audit_summary.txt
ausearch
ausearch -m EXECVE --start recent > /forensics/output/audit_execve.txt
ausearch
ausearch -m USER_AUTH,USER_LOGIN --start today > /forensics/output/audit_auth.txt
Collection Constraints
- •Paths and log sources vary by distribution, init system, logging stack, and installed packages. Validate the active distro and service set before treating absence as meaningful.
- •Centralized log copies may normalize, truncate, or drop fields relative to the original on-host artifact. Preserve the local source when scope and access permit.
MITRE ATT&CK Techniques
T1059.004T1078T1068T1548.001