Verify Baseline; Generate Baseline - F-SECURE ANTI-VIRUS LINUX SERVER SECURITY Administrator's Manual

Hide thumbs Also See for ANTI-VIRUS LINUX SERVER SECURITY:
Table of Contents

Advertisement

6.4.2

Verify Baseline

6.4.3

Generate Baseline

When the Software Installation Mode is enabled, any process can load
any kernel modules regardless whether they are in the baseline or not
and any process can change any files in the baseline, whether those files
are protected or not. The real-time scanning is still enabled and it alerts of
any malware found during the installation.
IMPORTANT: If you install software without the Software
Installation Mode when Integrity Checking monitors updated files,
you may be unable to install or use the new software. For example,
Integrity Checking may prevent a kernel update from booting
properly as new drivers are not in the baseline.
Command Line
For information how to use the Software Installation Mode from the shell,
see "fsims", 76.
Enter your passphrase to verify the baseline. For more information about
the passphrase, see "Passphrase", 64.
Do not start any other integrity checking processes while the product
verifies the baseline.
You can verify the baseline manually to make sure that your system is
safe and all baselined files are unmodified. If an attacker has managed to
gain a root access to the system and regenerated the baseline, the
regenerated baseline does not match against your passphrase when you
verify the baseline.
Integrity Checking is set up by creating a baseline of the system files that
you want to protect.
A default set of system files is added to the Known Files list during the
installation. By default, Kernel Module Verification is enabled during the
installation and the baseline is generated from the Known Files list. If you
CHAPTER 6
63

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents