seaudit(8) System Manager's Manual seaudit(8)NAME
seaudit - SELinux graphical audit log analysis tool
SYNOPSIS
seaudit [OPTIONS] [POLICY ...]
DESCRIPTION
seaudit allows the user to view and filter the contents of a log file. seaudit supports the syslog and auditd log formats and provides
queries to inspect the SELinux policy based on log messages.
POLICY
seaudit supports loading a SELinux policy in one of four formats.
source A single text file containing policy source for versions 12 through 21. This file is usually named policy.conf.
binary A single file containing a monolithic kernel binary policy for versions 15 through 21. This file is usually named by version - for
example, policy.20.
modular
A list of policy packages each containing a loadable policy module. The first module listed must be a base module.
policy list
A single text file containing all the information needed to load a policy, usually exported by SETools graphical utilities.
If no policy file is provided, seaudit will search for the system default policy: checking first for a source policy, next for a binary
policy matching the running kernel's preferred version, and finally for the highest version that can be found. If no policy can be found,
seaudit will begin with no policy loaded.
OPTIONS -l FILE, --log=FILE
Upon startup, open the log FILE instead of the system log file.
-h, --help
Print help information and exit.
-V, --version
Print version information and exit.
AUTHOR
This manual page was written by Jeremy A. Mowery <jmowery@tresys.com>.
COPYRIGHT
Copyright(C) 2006-2007 Tresys Technology, LLC
BUGS
Please report bugs via an email to setools-bugs@tresys.com.
SEE ALSO seaudit-report(8)seaudit(8)
Check Out this Related Man Page
seaudit-report(8) System Manager's Manual seaudit-report(8)NAME
seaudit-report - SELinux audit log reporting tool
SYNOPSIS
seaudit-report [OPTIONS] LOGFILE ...
DESCRIPTION
seaudit-report allows the user to generate custom audit log reports from the command line or by integration with the Logwatch tool.
OPTIONS -s, --stdin
Read log data from standard input instead of from a file. File(s) specified on the command line will be ignored.
-m, --malformed
Include malformed log messages in generated report.
-o FILE, --output=FILE
Write output to FILE instead of standard output.
-c FILE, --config=FILE
Read configuration options from FILE instead of the default config file.
--html Set output format to HTML instead of plain text.
--stylesheet=FILE
Specify the HTML stylesheet to use for formatting the HTML report. This option is ignored if --html is not given. See the default
styesheet for an example (installed at /usr/share/setools/3.3/seaudit-report.css).
-V, --version
Print version information and exit.
-h, --help
Print help information and exit.
AUTHOR
This manual page was written by Jeremy A. Mowery <jmowery@tresys.com>.
COPYRIGHT
Copyright(C) 2004-2007 Tresys Technology, LLC
BUGS
Please report bugs via an email to setools-bugs@tresys.com.
SEE ALSO seaudit(8)seaudit-report(8)
Hi Friends,
I have a .log file generated from a tool(Windows PC) which can be opened using a notepad, but when I tried to view the file in unix (cygwin on my laptop) the file type is showing as binary file, So I am unable to process the file.
I need to extract some of the selected text... (3 Replies)
Hello. Let's say as an example I have the below mynetworks list and the MYNETS policy bank set up to allow these networks to bypass spam filtering. But let's say I have a single IP within mynetworks that I don't want to bypass spam filtering. Let's call it 192.168.10.10. I've tried just inputting... (0 Replies)