Lynis 3.0: Open source auditing program on Linux system

Lynis is an open source security monitoring tool. Used by system administrators, security professionals, and penetration testers to evaluate the security defense of Linux and UNIX-based systems.

It runs on the host itself, so it performs more extensive security scans than vulnerability scanners.

Supported operating systems

Lynis runs on almost all UNIX-based systems and versions, including:

It even runs on Raspberry Pi or QNAP devices.

Optional installation

Lynis is lightweight and easy to use. The installation is optional: just copy it to a system and use the "./lynis audit system" command to start the security scan.

It is written in shell και κυκλοφορεί ως λογισμικό ανοιχτού κώδικα ( ). Πακέτα λογισμικού είναι διαθέσιμα από το αποθετήριο του project.

Use

Performs hundreds of individual tests. Each test helps determine the security status of the system. What happens during a scan with Lynis:

Steps

  1. Identify the operating system
  2. Search for available tools and utilities
  3. Check for Lynis updates
  4. Perform tests with enabled plugins
  5. Perform safety tests by category
  6. Report the status of the security scan

In addition to the data displayed on the screen, all technical details about the scan are stored in a καταγραφής. Τυχόν ευρήματα (προειδοποιήσεις, προτάσεις, ) are stored in a reference file.

Application snapshots

You can download the program from here.

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).