Proof of Concept: Use Ansible to manage the Advanced Intrusion Detection Environment (AIDE)

This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible knowledge, such as the use of Ansible roles and the execution of […]

Introduction to the Advanced Intrusion Detection Environment (AIDE)

This introduction provides answers to the following questions: For this introduction I used RHEL 9 as my operating system of choice, but AIDE is available for other Linux distributions as well. In order to follow this introduction, you should be familiar with the basics of Linux system administration and at least know the following terms: […]