<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AppArmor &#8211; Eternal Center</title>
	<atom:link href="https://eternalcenter-sep-2022.github.io/category/system/system-network-system-security-system-log/system-security/apparmor/feed/" rel="self" type="application/rss+xml" />
	<link>https://eternalcenter-sep-2022.github.io/</link>
	<description></description>
	<lastBuildDate>Thu, 28 Jul 2022 07:14:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>[内容] AppArmor 的设置</title>
		<link>https://eternalcenter-sep-2022.github.io/apparmor/</link>
		
		<dc:creator><![CDATA[Mingyu Zhu]]></dc:creator>
		<pubDate>Thu, 28 Jul 2022 07:12:28 +0000</pubDate>
				<category><![CDATA[AppArmor]]></category>
		<category><![CDATA[Chinese (中文)]]></category>
		<category><![CDATA[System (系统)]]></category>
		<category><![CDATA[System Network & System Security & System Log (系统网络 & 系统安全 & 系统日志)]]></category>
		<category><![CDATA[System Process Security (系统进程安全)]]></category>
		<category><![CDATA[System Security (系统安全)]]></category>
		<guid isPermaLink="false">https://eternalcenter-sep-2022.github.io/?p=27354</guid>

					<description><![CDATA[内容一：显示 AppArmor 保护进程的情况 1.1 显示所有 AppArmor 保护进程的情况 1.2 显示所有正在运行并监听网络但是没有被 AppArmor 保护的进程 内容二：设置 AppArmor 保护进程的策略 2.1 将所有 AppArmor 进程规则设置为 enforce 模式 2.2 将所有 AppArmor 进程规则设置为 complain 模式 2.3 将所有 AppArmor 进程规则设置为 disable 模式]]></description>
										<content:encoded><![CDATA[
<h3>内容一：显示 AppArmor 保护进程的情况</h3>



<h4>1.1 显示所有 AppArmor 保护进程的情况</h4>



<pre class="wp-block-code"><code># aa-status</code></pre>



<h4>1.2 显示所有正在运行并监听网络但是没有被 AppArmor 保护的进程</h4>



<pre class="wp-block-code"><code># aa-unconfined</code></pre>



<h3>内容二：设置 AppArmor 保护进程的策略</h3>



<h4>2.1 将所有 AppArmor 进程规则设置为 enforce 模式</h4>



<pre class="wp-block-code"><code># aa-enforce /etc/apparmor.d/*</code></pre>



<h4>2.2 将所有 AppArmor 进程规则设置为 complain 模式</h4>



<pre class="wp-block-code"><code># aa-complain /etc/apparmor.d/*</code></pre>



<h4>2.3 将所有 AppArmor 进程规则设置为 disable 模式</h4>



<pre class="wp-block-code"><code># aa-disable /etc/apparmor.d/*</code></pre>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>[内容] audit 常用的监控规则</title>
		<link>https://eternalcenter-sep-2022.github.io/common-monitoring-rules-of-audit/</link>
		
		<dc:creator><![CDATA[Mingyu Zhu]]></dc:creator>
		<pubDate>Thu, 28 Jul 2022 06:22:23 +0000</pubDate>
				<category><![CDATA[AppArmor]]></category>
		<category><![CDATA[Chinese (中文)]]></category>
		<category><![CDATA[SELinux]]></category>
		<category><![CDATA[System (系统)]]></category>
		<category><![CDATA[System File Security (系统文件安全)]]></category>
		<category><![CDATA[System General Log (系统普通日志)]]></category>
		<category><![CDATA[System Log (系统日志)]]></category>
		<category><![CDATA[System Network & System Security & System Log (系统网络 & 系统安全 & 系统日志)]]></category>
		<category><![CDATA[System Security (系统安全)]]></category>
		<category><![CDATA[System Security Log (系统安全日志)]]></category>
		<guid isPermaLink="false">https://eternalcenter-sep-2022.github.io/?p=27352</guid>

					<description><![CDATA[内容一：监控 SELinux 配置文件 1.1 在 audit 添加监控 SELinux 配置文件的规则 添加以下内容： 1.2 让添加的监控 SELinux 配置文件的规则生效 1.3 确认添加的监控 SELinux 配置文件的规则已生效 内容二：监控 AppArmor 配置文件 2.1 在 audit 添加监控 AppArmor 配置文件的规则 添加以下内容： 2.2 让添加的监控 AppArmor 配置文件的规则生效 2.3 确认添加的监控 AppArmor 配置文件的规则已生效]]></description>
										<content:encoded><![CDATA[
<h3>内容一：监控 SELinux 配置文件</h3>



<h4>1.1 在 audit 添加监控 SELinux 配置文件的规则</h4>



<pre class="wp-block-code"><code># vim /etc/audit/rules.d/audit.rules</code></pre>



<p>添加以下内容：</p>



<pre class="wp-block-code"><code>......
-w /etc/selinux/ -p wa -k MAC-policy
-w /usr/share/selinux/ -p wa -k MAC-policy</code></pre>



<h4>1.2 让添加的监控 SELinux 配置文件的规则生效</h4>



<pre class="wp-block-code"><code># service auditd restart</code></pre>



<h4>1.3 确认添加的监控 SELinux 配置文件的规则已生效</h4>



<pre class="wp-block-code"><code># auditctl -l | grep -i selinux</code></pre>



<h3>内容二：监控 AppArmor 配置文件</h3>



<h4>2.1 在 audit 添加监控 AppArmor 配置文件的规则</h4>



<pre class="wp-block-code"><code># vim /etc/audit/rules.d/audit.rules</code></pre>



<p>添加以下内容：</p>



<pre class="wp-block-code"><code>......
-w /etc/apparmor/ -p wa -k MAC-policy
-w /etc/apparmor.d/ -p wa -k MAC-policy</code></pre>



<h4>2.2 让添加的监控 AppArmor 配置文件的规则生效</h4>



<pre class="wp-block-code"><code># service auditd restart</code></pre>



<h4>2.3 确认添加的监控 AppArmor 配置文件的规则已生效</h4>



<pre class="wp-block-code"><code># auditctl -l | grep -i apparmor</code></pre>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>[CONTENT] The difference between SELinux and AppArmor</title>
		<link>https://eternalcenter-sep-2022.github.io/the-difference-between-selinux-and-apparmor/</link>
		
		<dc:creator><![CDATA[Mingyu Zhu]]></dc:creator>
		<pubDate>Mon, 25 Jul 2022 07:57:01 +0000</pubDate>
				<category><![CDATA[AppArmor]]></category>
		<category><![CDATA[English (英文)]]></category>
		<category><![CDATA[SELinux]]></category>
		<category><![CDATA[System (系统)]]></category>
		<category><![CDATA[System Security (系统安全)]]></category>
		<guid isPermaLink="false">https://eternalcenter-sep-2022.github.io/?p=27188</guid>

					<description><![CDATA[Selinux 1) Default for Rocky Linux, AlmaLinux, CentOS, Red Hat2) Designed to protect the entire operating system AppArmor 1) Default for openSUSE, Debian, Ubuntu, SLE2) Designed to protect specific applications, limit the resources that particular application can use3) Uses path names]]></description>
										<content:encoded><![CDATA[
<h3>Selinux</h3>



<p>1) Default for Rocky Linux, AlmaLinux, CentOS, Red Hat<br>2) Designed to protect the entire operating system</p>



<h3>AppArmor</h3>



<p>1) Default for openSUSE, Debian, Ubuntu, SLE<br>2) Designed to protect specific applications, limit the resources that particular application can use<br>3) Uses path names</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
