Linux
View all Worklets
LinuxLinux

Linux - Software Lifecycle - Install Audit

Install the Linux audit daemon to log system events and security activities across your endpoints

Worklet Details

What the Linux audit daemon installer does

This Automox Worklet™ installs the audit daemon (auditd) on Linux endpoints to enable comprehensive system event logging. The Worklet checks if auditd is already installed on each endpoint, and if not, it automatically detects the appropriate package manager (apt or yum) and installs the audit service.

Once installed, the Worklet provides a foundation for security monitoring and compliance auditing. The audit daemon generates detailed log entries through the auditctl command-line tool, capturing information about system events, user activities, and file access patterns across your infrastructure.

The Worklet supports both Red Hat-based systems (using yum/dnf) and Debian-based systems (using apt-get), making it universally applicable across diverse Linux environments.

Why deploy audit logging on your Linux endpoints

Organizations face compliance failures when auditors discover Linux systems without proper event logging. Security incidents on systems without auditd leave no forensic trail, making it impossible to determine what happened or who was responsible. Linux audit logging is critical for organizations that need to maintain detailed records of system activity for security, compliance, and forensic purposes. Many regulatory frameworks including PCI-DSS, HIPAA, NIST 800-53, and CIS Benchmarks require comprehensive audit logging on systems that handle sensitive data.

Deploying auditd enables your IT Operations team to detect unauthorized access attempts, track configuration changes, monitor privileged user activity, and identify security breaches through detailed system event logs. This visibility is essential for both proactive threat detection and post-incident investigation.

By automating the installation of auditd across your Linux fleet through Automox, you standardize your logging infrastructure, eliminate manual installation errors, and maintain consistent compliance monitoring across all your endpoints without requiring hands-on administrative intervention.

How audit daemon installation works

  1. Evaluation phase: The Worklet checks if the file /usr/sbin/auditctl exists on the endpoint. If it is present, auditd is already installed and no action is needed.

  2. Remediation phase: The Worklet detects the endpoint's package manager by checking for yum (Red Hat/CentOS/Fedora) or apt-get (Debian/Ubuntu). It then installs the audit package using the appropriate command: apt install auditd for Debian systems or yum install audit for Red Hat systems.

Linux audit daemon installation requirements

  • Linux endpoint running a Debian-based distribution (Ubuntu, Debian) or Red Hat-based distribution (CentOS, RHEL, Fedora)

  • Root or sudo access required to install system packages

  • Automox agent version 1.42.22 or later

  • Internet connectivity or configured package repositories to download the audit package

  • FixNow compatible for immediate installation if needed

Expected state after audit daemon installation

After the Worklet completes successfully, your Linux endpoint will have the audit daemon installed and ready to capture security events. The audit daemon will be installed on your endpoint. The auditctl tool will be available at /usr/sbin/auditctl, and you can use it to configure audit rules and monitor system events. The audit service provides the foundation for logging system calls, file access, user activities, and security-relevant events.

To verify successful installation, you can run the command auditctl -l to list current audit rules or check the audit log files typically stored in /var/log/audit/. With auditd installed, your endpoint is now ready for detailed security monitoring and compliance audit logging as required by your organization's policies and regulatory frameworks.

How to validate install audit changes

  1. Run this Worklet on a pilot Linux endpoint and review evaluation output for install audit.

  2. Confirm Automox activity logs show successful completion and exit code 0.

  3. Verify endpoint state using checks aligned to evaluation script logic, such as exit, else.

  4. Validate remediation effects from script operations such as function, return, elif, then rerun evaluation for compliance.

View in app
evalutation image
remediation image

Consider Worklets your easy button

What's a Worklet?

A Worklet is an automation script, written in Bash or PowerShell, designed for seamless execution on endpoints – at scale – within the Automox platform. Worklet automation scripts perform configuration, remediation, and the installation or removal of applications and settings across Windows, macOS, and Linux.

do more with worklets