Tagged articles
10 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
May 2, 2026 · Information Security

Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation

This article walks operations engineers through the most frequent security‑configuration problems encountered during Grade‑Protection (等保) remediation, detailing the regulatory background, specific compliance gaps, step‑by‑step remediation commands for Linux systems, verification methods, FAQs, and a practical implementation workflow.

AuditdGrade ProtectionLinux Hardening
0 likes · 28 min read
Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation
MaGe Linux Operations
MaGe Linux Operations
Apr 30, 2026 · Information Security

20 Essential Server Hardening Steps Before Launching a New Machine

This guide provides a detailed 20‑item checklist for Linux server hardening—covering snapshots, account management, SSH key authentication, password policies, firewall rules, service reduction, kernel tweaks, logging, and verification scripts—to ensure a new production server is secure before it goes live.

AIDEAuditdFail2ban
0 likes · 33 min read
20 Essential Server Hardening Steps Before Launching a New Machine
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2026 · Information Security

How to Harden Linux Servers: A Step‑by‑Step Guide to Secure SSH, Accounts, Firewalls, and Auditing

This comprehensive guide walks you through Linux host hardening by explaining the security baseline, detailing default configurations, highlighting common pitfalls, and providing concrete, verifiable adjustments for account policies, SSH, firewalls, kernel parameters, file permissions, and audit logging, complete with scripts, examples, and real‑world case studies.

AuditdHardeningLinux
0 likes · 40 min read
How to Harden Linux Servers: A Step‑by‑Step Guide to Secure SSH, Accounts, Firewalls, and Auditing
MaGe Linux Operations
MaGe Linux Operations
Mar 4, 2026 · Information Security

Master Linux Intrusion Detection & Incident Response: A Practical Hands‑On Guide

This comprehensive guide walks you through building a layered Linux intrusion detection system, configuring host‑based tools such as AIDE, rkhunter, and auditd, automating security audits, performing forensic investigations, and executing a six‑step incident response workflow to detect, contain, and remediate attacks effectively.

AIDEAuditdForensics
0 likes · 59 min read
Master Linux Intrusion Detection & Incident Response: A Practical Hands‑On Guide
Liangxu Linux
Liangxu Linux
Jan 2, 2024 · Information Security

How to Monitor Linux User Activity with Built‑In Commands and Auditd

This guide explains how to track Linux user activity and system events using native commands such as who, w, last, ps, ss, journalctl, and the auditd framework, providing step‑by‑step examples and advanced auditing techniques for security and compliance.

AuditdSysadmincommands
0 likes · 7 min read
How to Monitor Linux User Activity with Built‑In Commands and Auditd
Efficient Ops
Efficient Ops
Mar 3, 2021 · Information Security

How to Efficiently Audit Linux System Operations Without Overloading Logs

This article explains why detailed system operation logs are essential for security audits and troubleshooting, outlines filtering guidelines to avoid noisy data, and compares five Linux auditing methods—history, custom bash, snoopy, auditd, and eBPF—highlighting their strengths, limitations, and practical configuration examples.

AuditdLinuxaudit
0 likes · 13 min read
How to Efficiently Audit Linux System Operations Without Overloading Logs
Liangxu Linux
Liangxu Linux
Jan 2, 2021 · Operations

How to Effectively Audit Linux System Operations and Cut Down Noise

This article explains why detailed Linux system operation auditing is essential for security and troubleshooting, outlines practical filtering rules to avoid redundant or sensitive logs, and compares five auditing approaches—history, custom bash, snoopy, auditd, and eBPF—detailing their strengths, limitations, and configuration examples.

AuditdLinuxeBPF
0 likes · 13 min read
How to Effectively Audit Linux System Operations and Cut Down Noise
Open Source Linux
Open Source Linux
Dec 28, 2020 · Information Security

Effective Linux System Auditing: Methods, Filters & Best Practices

Auditing Linux system operations is essential for security and troubleshooting, but excessive logs can overwhelm analysis; this guide outlines common filtering rules and compares five recording methods—history, custom bash, snoopy, auditd, and eBPF—highlighting their advantages, limitations, and practical configuration examples.

AuditdLinuxeBPF
0 likes · 13 min read
Effective Linux System Auditing: Methods, Filters & Best Practices
Efficient Ops
Efficient Ops
Nov 19, 2020 · Information Security

How to Efficiently Audit Linux System Operations: Tools, Tips, and Filtering Rules

This article explains why detailed system operation logs are essential for security audits and troubleshooting, outlines practical filtering guidelines, and compares five Linux auditing methods—history, custom bash, snoopy, auditd, and eBPF—highlighting their strengths, limitations, and usage examples.

AuditdLinux auditingeBPF
0 likes · 13 min read
How to Efficiently Audit Linux System Operations: Tools, Tips, and Filtering Rules