ausearch_add_interpreted_item - Linux


Overview

ausearch_add_interpreted_item is a command-line tool used to add an interpreted item to the audit subsystem. An interpreted item is an Audit event that is created by an auditd plugin to analyze raw audit data and generate meaningful audit events. It provides a flexible way to customize and extend the audit system.

Syntax

ausearch_add_interpreted_item [options] <item_key> [args...]

Options/Flags

  • -h, –help: Display help information.
  • -i, –ignore_fprint: Ignore file fingerprint.
  • -I, –item_dir: Path to the directory containing interpreted item definitions (default: /etc/audit/rules.d).
  • -t, –test: Test the interpreted item without actually adding it to the system.

Examples

Example 1: Add an interpreted item that generates an event when a user logs in:

ausearch_add_interpreted_item login_event \
    -a always,exit \
    -F auid>=1000 \
    -F key=session \
    -F exe=/bin/login

Example 2: Test an interpreted item before adding it:

ausearch_add_interpreted_item -t login_event \
    -F key=session \
    -F exe=/bin/login

Common Issues

  • Make sure that the interpreted item definition is valid and follows the correct syntax.
  • Ensure that the auditd service is running and audit plugins are loaded.

Integration

ausearch_add_interpreted_item can be used together with other Linux commands to automate security monitoring tasks. For example, it can be used with ausearch to search for events generated by interpreted items.

Related Commands

  • auditctl – Controls the kernel audit subsystem.
  • ausearch – Searches for audit events.
  • augenrules – Generates audit rules from a policy file.