Chapter 11. Safeguarding Against Threats

This chapter contains the following recipes:

  • Sending messages to Syslog
  • Rotating log files with logrotate
  • Using Tripwire to detect modified files
  • Using ClamAV to fight viruses
  • Checking for rootkits with chkrootkit
  • Using Bacula for network backups

Introduction

From logging your system's activities to sniffing out rootkits, this chapter presents recipes to help protect the investment you've made in your system and its data against various threats. First, you'll learn how to set up a central log server using Syslog, and then, how to rotate log files to make sure that they don't grow out of control. Then, we'll look at how Tripwire is used to detect system intrusion by checking if changes have been made to important ...

Get CentOS 7 Server Deployment Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.