How to install aide centos

Introduction

In this tutorial, we will explore how to install and configure AIDE (Advanced Intrusion Detection Environment) on CentOS. AIDE is a powerful tool designed for monitoring changes to files on the system, helping you detect unauthorized access and modifications. 

Ideal for system administrators and security professionals, this guide will provide step-by-step instructions to ensure a successful setup of AIDE on your CentOS system. By the end of this tutorial, you will have a robust intrusion detection system in place, capable of providing detailed reports about the integrity of your files and system security.

What does Aide mean

AIDE is one of the most popular tools for monitoring the server changes in a LINUX based system.  It call as Advanced Intrusion Detection Environment.

Install AIDE on Centos

$ sudo yum install aide
Check AIDE Version on your system
$ sudo aide -v

Configure AIDE

$ sudo cp /etc/aide.conf /etc/aide.conf_BK
Add lines not check /tmp and /proc in aide.conf file
!/tmp
!/proc

Create the database

$ sudo aide --init
$ sudo mv /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gz
$ sudo cd /var/lib/aide

Run the AIDE check

$ sudo aide --check

Set cronjob to run AIDE check

$ sudo vi /etc/cron.daily/aide

// The content as below:

#!/bin/bash

MAILTO=root
LOGFILE=/var/log/aide/aide.log
AIDEDIR=/var/lib/aide

/usr/sbin/aide  -u > $LOGFILE
cp $AIDEDIR/aide.db.new.gz $AIDEDIR/aide.db.gz

x=$(grep "Looks okay" $LOGFILE | wc -l)

if [ $x -eq 1 ]
then
    echo "All Systems Look OK" | /bin/mail -s "AIDE OK" $MAILTO
else
    echo "$(egrep "added|changed|removed" $LOGFILE)" | /bin/mail -s "AIDE DETECTED CHANGES" $MAILTO
fi
exit

Change mode aide file

$ sudo chmod 755 /etc/cron.daily/aide

For example, Check log change

$ sudo egrep "added|changed|removed" /var/log/aide/aide.log

How to install aide centos


Conclusion

Successfully installing AIDE on CentOS marks a significant step towards enhancing your system's security. By following the steps outlined in this tutorial, you now have a powerful tool at your disposal to monitor and detect any unauthorized changes to your system files. 

It is essential to regularly update AIDE's database and review the reports generated by AIDE to ensure your system remains secure. With AIDE configured, you can have greater peace of mind knowing that you have proactive measures in place to alert you of potential security breaches. Remember, the key to maintaining a secure system is ongoing vigilance and timely response to any alerts issued by AIDE.

Comments

Popular posts from this blog

zimbra some services are not running [Solve problem]

Bash script list all IP addresses connected to Server

How to install php7 on centos 6