You want to know if you can make changes to audited logs via sisaudisp.conf" file.
Current:
active = no
direction = out
path = /opt/Symantec/sdcssagent/IDS/bin/sisaudisp
type = always
args = none
format = string
Proposed change:
active = yes
direction = out
path = /opt/Symantec/sdcssagent/IDS/bin/sisaudisp
type = always
args = LOG_INFO LOG_LOCAL6
format = string
Symantec Endpoint protection for Linux
Loss of all the auditd logs (from the Linux OS onboarding)
The proposed changes will have an impact on the SEP agent:
disablePlugin()
{
logMessage "STATUS: Disabling plugin $1"
sed -i 's/active = \(yes\|no\)/active = no/' $1
}
enablePlugin()
{
logMessage "STATUS: Enabling plugin $1"
sed -i 's/active = \(yes\|no\)/active = yes/' $1
}
The agent uses sed to toggle active = yes/no based on whether:
grep -iq "edrcheckenabled=1" $SIS_IDS_DIR/system/agent.ini; EDR_ENABLED=$? grep -iq "linuxnetworkcollectorenabled=1" $SIS_IDS_DIR/system/agent.ini; NETWORK_ENABLED=$? // ... if ( [ $EDR_ENABLED -eq 0 ] && [ $NETWORK_ENABLED -eq 0 ] ); then installNetRules $NETWORK_MAGIC PLUGIN_ACTION=enablePlugin fi
NO - Changes will NOT reliably persist:
| Event | Impact on sisaudisp.conf |
|---|---|
| Reboot | The active setting may be toggled by the agent when services restart (via sepl_auditd_monitor.sh reconfig) |
| Agent Upgrade | The RPM packaging uses %verify(not md5 size mtime) flag which means the file may be overwritten during upgrades to the default template |
| Policy Changes | When EDR/Network policies are applied, the agent will overwrite the active setting |
The issue (lost auditd logs from Linux OS onboarding) is NOT caused by sisaudisp.conf settings. The sisaudisp plugin:
Likely causes of lost auditd logs: