
Summary
The rule identifies the (re)initialization of the Linux audit daemon (auditd) by tracking log entries that indicate a DAEMON_START event. This event occurs when audit logging resumes after being stopped or starts during system boot. While DAEMON_START events are expected during normal system reboots or configuration changes, they may also indicate attempts to evade monitoring by restarting the audit logging with altered or less comprehensive rules. The detection becomes critically important when DAEMON_START events are correlated with other audit events like DAEMON_END, DAEMON_ABORT, and specific command activities associated with auditctl. Anomalies such as frequent or unanticipated occurrences of DAEMON_START should be scrutinized, particularly if they lack accompanying legitimate system or administrative actions. It provides insights into the integrity and continuity of audit logs, which are essential for system governance and security.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- User Account
- File
ATT&CK Techniques
- T1562.012
Created: 2025-06-06