Week 2: Monitoring Endpoints with HIDS & Auditd


π Key Topics Covered
This week was all about endpoint monitoring β the practice of observing activity on individual systems to detect intrusions, vulnerabilities, or anomalies.
In our lecture, we explored:
The role of Host Intrusion Detection Systems (HIDS) vs. HIPS (Intrusion Prevention Systems)
How to read and interpret Windows and Linux event logs
The structure and use of logs like
/var/log/syslog
,/var/log/auth.log
, and Windows Event ViewerVulnerability scanning concepts and the use of CVEs
How HIDS tools (like Wazuh and Auditd) collect, analyze, and alert on abnormal activity
We also discussed how tools like Splunk and Snort (coming up in later weeks) tie into larger enterprise endpoint and network monitoring.
π οΈ Tools Practiced
Auditd (Linux Audit Daemon)
ausearch (log filtering)
Vim (file editing and rule writing)
Linux terminal navigation
System-level log exploration using
tail
,dmesg
, and manual inspection
π» Lab Activity β Oops!...I Audit Again
This lab focused on setting up and using Auditd to monitor file modifications on a Linux machine.
Hereβs what I did:
1οΈβ£ Installed and verified Auditd on my VM.
2οΈβ£ Created and edited a test file (unit2_lab.txt
) using Vim.
3οΈβ£ Wrote custom audit rules to watch for write (-p w
) changes to the file.
4οΈβ£ Filtered logs using ausearch -k unit2_lab_changes
to track file edits and system activity tied to those changes.
π I was able to trace exactly which command modified the file (vim.basic
) and confirm the system events using my custom filter key. This hands-on practice made it clear how powerful and customizable host-based monitoring can be.
β Key Outcome: I learned to build and test rules for real-time file monitoring β a foundational Blue Team skill.
π Weekly Project β Letβs wget This Bread
In this project, I used my Auditd setup to monitor a protected directory and detect attacks launched through provided scripts.
π§© My workflow:
Configured write-watch rules for files in
/protected_files
Executed three attack scripts (
attack-a
,attack-b
,attack-c
) that modified unknown filesUsed
ausearch
with filter keys to analyze logs and map each attack to the file it altered
β Goal achieved: Successfully identified the modified files and matched them with the correct attack β showcasing how forensic tools can pinpoint malicious behavior.
π‘ Key Takeaways
Auditd is a powerful HIDS tool for monitoring Linux systems at the host level.
Understanding log structure (especially filtering with
ausearch
) is critical for real-world investigations.Knowing how to use Vim and sudo is essential when working on system-level files in Linux.
Detection and attribution of file modifications are foundational steps toward responding to host-level attacks.
π€ Reflection
Week 2 built on the foundations of network-level defense by taking the battle to the host level. It felt like stepping into the shoes of a SOC analyst β configuring monitoring, triggering events, and interpreting logs to uncover what really happened under the hood. Iβm starting to understand how Blue Team defenders build layered visibility across the system.
π’ Next Week
We will explore Snort, a powerful Network Intrusion Detection System (NIDS), and use it to monitor live network traffic and detect malicious behavior in real time!
Subscribe to my newsletter
Read articles from Aayush Acharya directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Aayush Acharya
Aayush Acharya
π» CS and Math Major at Elmhurst University β Rising Senior π Aspiring Software Engineer & Cybersecurity Specialist π Passionate about Math π Plays Ping Pong, π Cricket, πΎ Tennis β¨ Always learning, always growing!