Integrity Checking; Known Files; Rootkit Prevention - F-SECURE LINUX SECURITY Manual

Table of Contents

Advertisement

Element

Integrity Checking

Following tables display the integrity checking settings.

Known Files

The following user interface controls appear on the
Checking
Known Files
Element
Known files

Rootkit Prevention

The following user interface controls appear on the
Checking
Rootkit Prevention
Element
Kernel module verification
No
Yes
Report
F-Secure Linux Security | Advanced Web User Interface | 107
Description
Officially assigned ports are available from:
ftp://ftp.iana.org/assignments/port-numbers
Advanced User Interface
page.
Description
This table contains files that have been added
to integrity checking.
Advanced User Interface
page.
Description
When enabled, integrity checking will verify
kernel modules before they are allowed to load.
Only baselined and matching kernel modules
are allowed to load.
If disabled, integrity checking will not perform
any checking for kernel modules.
If report only, integrity checking will check the
kernel modules against baselined information
but will only alert if kernel modules do not
Integrity
Integrity

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

This manual is also suitable for:

Linux security 7.02

Table of Contents