Linux Administration
Minimizing Attack Surface
Disabling Unused Services
Applying Security Updates
Secure Configuration Practices
Concepts of Firewalls
Managing Rules with iptables
Using firewalld
Using ufw (Uncomplicated Firewall)
Opening and Closing Ports
Saving and Restoring Rules
Host-Based Intrusion Detection Systems (HIDS)
Monitoring Suspicious Activity
Security Auditing Tools
Modes
Enforcing
Permissive
Disabled
Policy Types
Managing Contexts
Profiles and Modes
Managing Profiles
Allowing and Denying Access
Troubleshooting Denials
Log File Types
Log Rotation
Configuration and Management
Previous
9. Storage Management
Go to top
Next
11. Shell Scripting and Automation