官术网_书友最值得收藏!

Chapter 2. Understanding SELinux Decisions and Logging

Once SELinux is enabled on a system, it starts its access control functionality as described in the previous chapter. This however might have some unwanted side effects, so in this chapter, we will:

  • Switch between SELinux in full enforcement mode (host-based intrusion prevention) versus its permissive, logging-only mode (host-based intrusion detection)
  • Use various methods to toggle the SELinux state (enabled or disabled, permissive or enforcing)
  • Disable SELinux protections for a single domain rather than the entire system
  • Learn to interpret the SELinux log events that describe to us what activities that SELinux has prevented

We finish with an overview of common methods for analyzing these logging events in day-to-day operations.

主站蜘蛛池模板: 中卫市| 清镇市| 盐山县| 武夷山市| 云龙县| 仁化县| 小金县| 班戈县| 沅陵县| 罗田县| 鄂伦春自治旗| 青阳县| 越西县| 金秀| 宁国市| 措美县| 大同市| 云浮市| 高雄市| 海门市| 淮安市| 铜陵市| 繁昌县| 义乌市| 开封县| 龙井市| 凉城县| 宁海县| 东安县| 五常市| 石渠县| 五河县| 临夏市| 宝兴县| 桑日县| 洛南县| 庆城县| 乌鲁木齐县| 两当县| 霍山县| 射阳县|