Fail2Ban monitors logs (e.g., SSH auth failures) and temporarily bans IPs via firewall rules.
Common commands:
sudo systemctl status fail2ban
sudo fail2ban-client status
sudo fail2ban-client status sshd
Typical configuration locations:
/etc/fail2ban/jail.conf (defaults)/etc/fail2ban/jail.d/*.conf or /etc/fail2ban/jail.local (your overrides)auditd records security-relevant events (syscalls, file access, policy changes).
Status:
sudo systemctl status auditd
sudo auditctl -s
Search audit logs:
sudo ausearch -ts today
sudo ausearch -m avc -ts recent # SELinux AVC denials