IN THIS CHAPTER
The Role of Logs
User Logins and Accounting
Automated Log Monitoring: LogSentry
Common System Log Changes
Chapter 18, "Alarm Systems: Intrusion Detection," gave you the tools to monitor the health of your network and identify potential attacks. But no amount of packet analysis can tell you what is actually taking place on your computer. The key to monitoring your computer's health is managing and interpreting the logfiles that are generated. Logs are Mac OS X's means of providing feedback to you, the user. Logs are also the first target of any attacker attempting to gain access to your machine. Without logs, you may never even realize your computer has been compromised.
Top |