Logging and auditing
Access violations can be logged
For posterior auditing.
Logged violations can be used to interactively improve profiles with aa-logprof
Auditing definitions
Per profile rule.
Global /sys/module/apparmor/parameters/audit
Profile auditing types
Profiles can specify a global auditing.
All matched rules within a profile produce a log entry.
Profile rules can individually specify their audit.
Produce a log when matched
Global auditing types
normal
Profiles’ audit types are respected.
quiet_denied
No logging of denials.
Overrides profile/rule individual auditing.
quiet
No logging.
Overrides profile/rule individual auditing.
all
All rules of all profiles produce a log when matched.
Profiles’ loading and enforcement
Profiles are loaded in the kernel, and associated to an executable file (defined in the profile).
If a profile exists for the loaded executable file, profiles are associated with processes upon an exec syscall.
Profiles can be modified in run-time. Processes associated with the profile will reflect the modifications.
New profiles loaded for an executable file are not enforced in existing processes using that file without any profile
Last updated