Lynis 3.0: Open source auditing program on Linux system

Lynis is an open source security monitoring tool. Used by system administrators, security professionals, and penetration testers to evaluate the security defense of Linux and UNIX-based systems.

It runs on the host itself, so it performs more extensive security scans than vulnerability scanners.

Supported operating systems

Lynis runs on almost all UNIX-based systems and versions, including:

  • AIX
  • FreeBSD
  • HP-UX
  • Linux
  • MacOS
  • NetBSD
  • OpenBSD
  • Solaris
  • and other

It even runs on Raspberry Pi or QNAP.

Optional

Lynis is lightweight and easy to use. Installation is optional: just copy it to one and use the "./lynis audit system" command to start the security scan.

It is written in shell and is released as open source software ( GPL ). Software packages are available from the project repository.

Use

Performs hundreds of individual tests. Each test helps determine the security status of the system. What happens during a scan with Lynis:

Steps

  1. Identify the operating system
  2. Search for available tools and utilities
  3. Check for Lynis updates
  4. Perform tests with enabled plugins
  5. Perform safety tests by category
  6. Report the status of the security scan

Except of the displayed on the screen, all technical details about the scan are saved in a log file. Any findings (alerts, suggestions, data collection) are saved in a report file.

Application snapshots

You can download the program from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).