The IDM_open_files modules monitors all open files in specified directories (and their subdirectories):
Files:
/etc/IDM_open_files/expected.local.lsof /etc/IDM_open_files/expected.<platform>.lsoflocal signatures for a particular directory take precedence over — i.e., override — <platform> signatures.
This example file configures IDM_open_files to monitor two directories, /dev, where intruder-related software if often hidden, and /lib,
# # -- reg-exps are fine (encouraged) : # DIR: "/dev" initctl null ptmx xconsole zero pts\/\d ttyS\d tty\d DIR: "/lib64" ld-2.3.4.so lib.*so.* security\/pam_[a-z0-9]+.so
The configurations given for a particular directory are converted into a regular expression match, for example, for /lib64, as specified above:
$of =~ m/ld-2.3.4.so |lib.*so.* |security\/pam_[a-z0-9]+.so/xAny file found open within /lib64 which does not match this reg-exp is logged.
...previous | up (conts) | next... |