{"id":3768,"date":"2019-03-13T22:11:06","date_gmt":"2019-03-13T16:41:06","guid":{"rendered":"https:\/\/blog.pheonixsolutions.com\/?p=3768"},"modified":"2019-03-13T22:15:59","modified_gmt":"2019-03-13T16:45:59","slug":"how-to-set-up-aide-advanced-intrusion-detection-environment","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/","title":{"rendered":"HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">Date Posted: 13\/03\/2019<\/h4>\n\n\n\n<h4 class=\"wp-block-heading\">Introduction<\/h4>\n\n\n\n<p>Aide also called as Advanced Intrusion Detection Environment is an open source host based file and directory integrity checker. <br><br> It is very usefull when someone placing a backdoor on your web site and make changes that may take your system down completely. <\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Functionality<\/h5>\n\n\n\n<p>Aide creates a database from your filesystem and stores various file attributes like permissions, inode number, user, group, file size, mtime and ctime, atime, growing size, number of links and link name.<br><br> When someone make changes in filesystem, then Aide compare the database against the real status of the system and report it to server administrator. <br><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"480\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Monitoring.png\" alt=\"\" class=\"wp-image-3773\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Monitoring.png 768w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Monitoring-300x188.png 300w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Monitoring-400x250.png 400w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p>In this tutorial, we will go through step by step instruction of how to install and use AIDE on centos -7 ambience.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Method 1<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">1. Install AIDE<\/h5>\n\n\n\n<pre class=\"wp-block-code\"><code># yum install aide<\/code><\/pre>\n\n\n\n<p><strong>Press y <\/strong>on the terminal to proceed with the installation.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2. Check Version.<\/h5>\n\n\n\n<p>Therefore  the installation  comletes successfully.<br><br>After that,  verify  the aide version using below command.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># aide -v<\/code><\/pre>\n\n\n\n<p>The output will show the version like below reference snapshot<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"784\" height=\"650\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.15.05-PM.png\" alt=\"\" class=\"wp-image-3774\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.15.05-PM.png 784w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.15.05-PM-300x249.png 300w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.15.05-PM-768x637.png 768w\" sizes=\"auto, (max-width: 784px) 100vw, 784px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">3. Generate a aide database.<\/h5>\n\n\n\n<p>You can use the default files as provided in the config file using <strong>\/etc\/aide.conf              <\/strong><br>Once changes to <strong>aide.conf <\/strong>file have been finalised.  However,  generate the database, using following command<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># aide \u2014 init<\/code><\/pre>\n\n\n\n<p>For instance,  the database has been successfully created, you can see a message on the console as shown below-<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"111\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.25.00-PM-1024x111.png\" alt=\"\" class=\"wp-image-3775\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.25.00-PM-1024x111.png 1024w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.25.00-PM-300x33.png 300w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.25.00-PM-768x84.png 768w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.25.00-PM.png 1176w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The database is created in location&nbsp;<strong>\/var\/lib\/aide\/aide.db.new.gz<\/strong>.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">4. Move the database<\/h5>\n\n\n\n<p> The database must be moved to location of<strong>\/var\/lib\/aide\/aide.db.gz<\/strong> .<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>#mv \/var\/lib\/aide\/aide.db.new.gz \/var\/lib\/aide\/aide.db.gz<\/code><\/pre>\n\n\n\n<h5 class=\"wp-block-heading\">5. you can issue the check command <\/h5>\n\n\n\n<p>This will take some time to execute.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># aide\u2013check<\/code><\/pre>\n\n\n\n<p> Similarly, if all the files gets match, then you will see the following message on the console:<\/p>\n\n\n\n<ul class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"123\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.40.56-PM-1024x123.png\" alt=\"\" data-id=\"3776\" data-link=\"https:\/\/blog.pheonixsolutions.com\/?attachment_id=3776\" class=\"wp-image-3776\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.40.56-PM-1024x123.png 1024w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.40.56-PM-300x36.png 300w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.40.56-PM-768x92.png 768w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2019\/03\/Screen-Shot-2019-03-13-at-7.40.56-PM.png 1084w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Method  2<\/h5>\n\n\n\n<p>Single-line command to perform all of the above steps:<br><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>yum install aide -y &amp;&amp; \/usr\/sbin\/aide \u2013init &amp;&amp; cp \/var\/lib\/aide\/aide.db.new.gz \/var\/lib\/aide\/aide.db.gz &amp;&amp; \/usr\/sbin\/aide \u2013c<\/code><\/pre>\n\n\n\n<p>In addition, schedule cron activity.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>echo \u201c05 5 * * * root \/usr\/sbin\/aide \u2013check\u201d >> \/etc\/crontab<\/code><\/pre>\n\n\n\n<p>That&#8217;s it. Thanks for using Pheonix solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT Date Posted: 13\/03\/2019 Introduction Aide also called as Advanced Intrusion Detection Environment is an open source host based file and directory integrity checker. It is very usefull when someone placing a backdoor on your web site and make changes that&hellip; <a href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/\" class=\"more-link read-more\" rel=\"bookmark\">Continue Reading <span class=\"screen-reader-text\">HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT<\/span><i class=\"fa fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[284,224],"tags":[581,260],"class_list":{"0":"post-3768","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-centos","7":"category-server-hardening","8":"tag-intrusion-detection","9":"tag-server-hardening","10":"h-entry","12":"h-as-article"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pheonix Solutions - We Empower Your Business Growth<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pheonix Solutions - We Empower Your Business Growth\" \/>\n<meta property=\"og:description\" content=\"HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT Date Posted: 13\/03\/2019 Introduction Aide also called as Advanced Intrusion Detection Environment is an open source host based file and directory integrity checker. It is very usefull when someone placing a backdoor on your web site and make changes that&hellip; Continue Reading HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"PHEONIXSOLUTIONS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-13T16:41:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-13T16:45:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Monitoring.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:site\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\"},\"headline\":\"HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT\",\"datePublished\":\"2019-03-13T16:41:06+00:00\",\"dateModified\":\"2019-03-13T16:45:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/\"},\"wordCount\":321,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Monitoring.png\",\"keywords\":[\"Intrusion detection\",\"Server Hardening\"],\"articleSection\":[\"Centos\",\"Server Hardening\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/\",\"name\":\"Pheonix Solutions - We Empower Your Business Growth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Monitoring.png\",\"datePublished\":\"2019-03-13T16:41:06+00:00\",\"dateModified\":\"2019-03-13T16:45:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Monitoring.png\",\"contentUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Monitoring.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-set-up-aide-advanced-intrusion-detection-environment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"name\":\"Pheonix Solutions\",\"description\":\"We Empower Your Business Growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\",\"name\":\"PheonixSolutions\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"width\":454,\"height\":300,\"caption\":\"PheonixSolutions\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PheonixSolutions-209942982759387\\\/\",\"https:\\\/\\\/x.com\\\/pheonixsolution\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/blog.pheonixsolutions.com\"],\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pheonix Solutions - We Empower Your Business Growth","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/","og_locale":"en_US","og_type":"article","og_title":"Pheonix Solutions - We Empower Your Business Growth","og_description":"HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT Date Posted: 13\/03\/2019 Introduction Aide also called as Advanced Intrusion Detection Environment is an open source host based file and directory integrity checker. It is very usefull when someone placing a backdoor on your web site and make changes that&hellip; Continue Reading HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT","og_url":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/","og_site_name":"PHEONIXSOLUTIONS","article_publisher":"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","article_published_time":"2019-03-13T16:41:06+00:00","article_modified_time":"2019-03-13T16:45:59+00:00","og_image":[{"url":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Monitoring.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@pheonixsolution","twitter_site":"@pheonixsolution","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/"},"author":{"name":"admin","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503"},"headline":"HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT","datePublished":"2019-03-13T16:41:06+00:00","dateModified":"2019-03-13T16:45:59+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/"},"wordCount":321,"commentCount":0,"publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Monitoring.png","keywords":["Intrusion detection","Server Hardening"],"articleSection":["Centos","Server Hardening"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/","url":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/","name":"Pheonix Solutions - We Empower Your Business Growth","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Monitoring.png","datePublished":"2019-03-13T16:41:06+00:00","dateModified":"2019-03-13T16:45:59+00:00","breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/#primaryimage","url":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Monitoring.png","contentUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2019\/03\/Monitoring.png"},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-set-up-aide-advanced-intrusion-detection-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/blog\/"},{"@type":"ListItem","position":2,"name":"HOW TO SET UP AIDE &#8211; ADVANCED INTRUSION DETECTION ENVIRONMENT"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/blog\/#website","url":"https:\/\/pheonixsolutions.com\/blog\/","name":"Pheonix Solutions","description":"We Empower Your Business Growth","publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pheonixsolutions.com\/blog\/#organization","name":"PheonixSolutions","url":"https:\/\/pheonixsolutions.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","contentUrl":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","width":454,"height":300,"caption":"PheonixSolutions"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","https:\/\/x.com\/pheonixsolution"]},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","caption":"admin"},"sameAs":["http:\/\/blog.pheonixsolutions.com"],"url":"https:\/\/pheonixsolutions.com\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7F4uM-YM","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/3768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=3768"}],"version-history":[{"count":0,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/3768\/revisions"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=3768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=3768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=3768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}