How To
Summary
This document provides a step-by-step guide to configure audit logging for RHEL 9 and above versions.
For steps on configuring audit logs for RHEL 6 to 8 versions, refer to the following link:
Configuring Linux to Send Audit Logs, https://www.ibm.com/docs/en/dsm?topic=os-configuring-linux-send-audit-logs
Document Location
Worldwide
[{"Type":"MASTER","Line of Business":{"code":"LOB77","label":"Automation Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSBQAC","label":"IBM Security QRadar SIEM"},"ARM Category":[{"code":"a8m0z000000cwt0AAA","label":"Log Source"}],"ARM Case Number":"TS019354767","Platform":[{"code":"PF016","label":"Linux"}],"Version":"7.0.0;7.1.0;7.2.0;7.2.2;7.2.3;7.2.4;7.2.5;7.2.6;7.2.7;7.2.8;7.3.0;7.3.1;7.3.2;7.3.3;7.4.0;7.4.1;7.4.2;7.4.3;7.5.0"}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
Modified date:
23 May 2025
UID
ibm17234210