What are syslog categories? List the available categories.
What will be an ideal response?
The category (also called a facility) refers to the subsystem that provides the corresponding message. Each program that uses syslog for logging is assigned such a category. The following describes these categories:
• authpriv. Used by all services that have anything to do with system security or authorization. All PAM messages use this category. The ssh daemon uses the auth category.
• cron. Accepts messages from the cron and at daemons.
• daemon. Used by various daemons, such as the ppp daemon, that do not have their own category.
• kern. A category for all kernel messages.
• lpr. This category handles messages from the printer system.
• news. This category is for messages from the news system. As with the mail system, many messages might need to be logged in a short time.
• mail. This category is for messages from the mail system. This is important because many messages can arrive very quickly.
• syslog. This category is for internal messages of the syslog daemon.
• user. This is a general category for messages on a user level. For example, it is used by login to log failed login attempts.
• uucp. This category handles messages from the uucp system.
• local0 - local7. These categories are available for your own configuration. All of the local categories can be used in your own programs. By configuring one of these categories, messages from your own programs can be administered individually through entries in the /etc/syslog.conf file.
You might also like to view...
Match the following terms to their meanings:
I. platform II. IBM compatible III. Mac OS X IV. Boot Camp V. AMD A. operating system used for Apple computers B. term used in the 1980s to describe personal computers C. combination of the operating system and hardware D. manufacturer of PC processors E. program that gives the user a choice of which OS to start
The Photo Album feature of PowerPoint is an efficient way to insert a large number of photographs into a slide show just by selecting the photographs you want to include in the presentation
Indicate whether the statement is true or false
In the accompanying figure, Item 4 points to the ____ button.
A. Previous Record B. Next Record C. View Merged Data D. View All Placeholders
Maria is conducting a security investigation and has identified a suspect. The suspect is an employee of the organization who had access to a file share containing sensitive information. The employee routinely accesses that share during the normal course of business but is suspected of stealing sensitive information from it and sending it to a competitor. Which element of a crime has Maria NOT yet established?
What will be an ideal response?