Code-Memo

Intrusion detection (Fail2Ban, auditd)

Fail2Ban (log-based banning)

Fail2Ban monitors logs (e.g., SSH auth failures) and temporarily bans IPs via firewall rules.

Common commands:

sudo systemctl status fail2ban
sudo fail2ban-client status
sudo fail2ban-client status sshd

Typical configuration locations:

auditd (Linux audit framework)

auditd records security-relevant events (syscalls, file access, policy changes).

Status:

sudo systemctl status auditd
sudo auditctl -s

Search audit logs:

sudo ausearch -ts today
sudo ausearch -m avc -ts recent   # SELinux AVC denials

Practical tips