How to identify the user who may perform some deleting operation over a file?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
1
down vote

favorite












There is a folder that maybe accessible to multiple users. If there is a file was deleted, is that possible to know which user delete this file and when? Thanks.







share|improve this question

























    up vote
    1
    down vote

    favorite












    There is a folder that maybe accessible to multiple users. If there is a file was deleted, is that possible to know which user delete this file and when? Thanks.







    share|improve this question























      up vote
      1
      down vote

      favorite









      up vote
      1
      down vote

      favorite











      There is a folder that maybe accessible to multiple users. If there is a file was deleted, is that possible to know which user delete this file and when? Thanks.







      share|improve this question













      There is a folder that maybe accessible to multiple users. If there is a file was deleted, is that possible to know which user delete this file and when? Thanks.









      share|improve this question












      share|improve this question




      share|improve this question








      edited Oct 17 '17 at 5:25









      peterh

      3,91882755




      3,91882755









      asked Oct 16 '17 at 21:51









      user288609

      3412412




      3412412




















          1 Answer
          1






          active

          oldest

          votes

















          up vote
          6
          down vote













          Yes. Use audit software. A popular implementation is audit or auditd. To help "prime the pump" on audit rules, one can acquire many audit-related rules for the software via the DISA STIG.



          Although the hyperlink points to a STIG (Security Technical Implementation Guide) for RHEL6 (RedHat Linux 6), it is nonetheless a good security baseline that will be mostly appropriate for your Linux system, perhaps with some interpolation to match your Linux.



          The software is developed by RedHat but available for any Linux. There is
          helpful documentation available.






          share|improve this answer























            Your Answer







            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "106"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            convertImagesToLinks: false,
            noModals: false,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );








             

            draft saved


            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f398504%2fhow-to-identify-the-user-who-may-perform-some-deleting-operation-over-a-file%23new-answer', 'question_page');

            );

            Post as a guest






























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            6
            down vote













            Yes. Use audit software. A popular implementation is audit or auditd. To help "prime the pump" on audit rules, one can acquire many audit-related rules for the software via the DISA STIG.



            Although the hyperlink points to a STIG (Security Technical Implementation Guide) for RHEL6 (RedHat Linux 6), it is nonetheless a good security baseline that will be mostly appropriate for your Linux system, perhaps with some interpolation to match your Linux.



            The software is developed by RedHat but available for any Linux. There is
            helpful documentation available.






            share|improve this answer



























              up vote
              6
              down vote













              Yes. Use audit software. A popular implementation is audit or auditd. To help "prime the pump" on audit rules, one can acquire many audit-related rules for the software via the DISA STIG.



              Although the hyperlink points to a STIG (Security Technical Implementation Guide) for RHEL6 (RedHat Linux 6), it is nonetheless a good security baseline that will be mostly appropriate for your Linux system, perhaps with some interpolation to match your Linux.



              The software is developed by RedHat but available for any Linux. There is
              helpful documentation available.






              share|improve this answer

























                up vote
                6
                down vote










                up vote
                6
                down vote









                Yes. Use audit software. A popular implementation is audit or auditd. To help "prime the pump" on audit rules, one can acquire many audit-related rules for the software via the DISA STIG.



                Although the hyperlink points to a STIG (Security Technical Implementation Guide) for RHEL6 (RedHat Linux 6), it is nonetheless a good security baseline that will be mostly appropriate for your Linux system, perhaps with some interpolation to match your Linux.



                The software is developed by RedHat but available for any Linux. There is
                helpful documentation available.






                share|improve this answer















                Yes. Use audit software. A popular implementation is audit or auditd. To help "prime the pump" on audit rules, one can acquire many audit-related rules for the software via the DISA STIG.



                Although the hyperlink points to a STIG (Security Technical Implementation Guide) for RHEL6 (RedHat Linux 6), it is nonetheless a good security baseline that will be mostly appropriate for your Linux system, perhaps with some interpolation to match your Linux.



                The software is developed by RedHat but available for any Linux. There is
                helpful documentation available.







                share|improve this answer















                share|improve this answer



                share|improve this answer








                edited Oct 16 '17 at 22:06


























                answered Oct 16 '17 at 22:00









                Christopher

                8,91022742




                8,91022742






















                     

                    draft saved


                    draft discarded


























                     


                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f398504%2fhow-to-identify-the-user-who-may-perform-some-deleting-operation-over-a-file%23new-answer', 'question_page');

                    );

                    Post as a guest













































































                    Popular posts from this blog

                    How to check contact read email or not when send email to Individual?

                    Displaying single band from multi-band raster using QGIS

                    How many registers does an x86_64 CPU actually have?