Auditing Denial Events in Permissive Mode
To enable permissive mode by default, edit /etc/fapolicyd/fapolicyd.conf
and set the permissive
configuration option to 1. You must restart the
fapolicyd service for the change to take effect. All denial events are then sent to the audit
log and tracked using fanotify
messages.
You must have at least one rule defined for auditd
to start logging
fapolicyd events. If you don't have any rules defined, no events appear in the audit log. You
can create any rule for auditing to start working. For example, you can create a rule to audit
changes to the configuration in /etc/fapolicyd
as follows:
sudo tee /etc/audit/rules.d/40-fapolicyd.rules > /dev/null <<'EOF'
# This policy monitors /etc/fapolicyd/ for changes to configuration
# This rule is generated to ensure that events are logged to the audit log
for fapolicyd tracking
-w /etc/fapolicyd/ -p wa -k fapolicyd_changes
EOF
You must restart the auditd
service for this rule to take effect:
sudo service auditd restart
Note:
auditd
can't be restarted by using the
systemctl
command.
Denial events are logged to the audit log. Review these by using the
ausearch
command. For example:
sudo ausearch --start today -m fanotify
Use aureport
to create easier to read outputs. For example:
sudo ausearch --start today -m fanotify --raw | aureport --file