Information
The /etc/rsyslog.conf file specifies rules for logging and which files are to be used to log certain classes of messages.
Rationale:
A great deal of important security-related information is sent via rsyslog (e.g., successful and failed su attempts, failed login attempts, root login attempts, etc.).
Solution
Edit the following lines in the /etc/rsyslog.conf file as appropriate for your environment:
auth,user.* /var/log/messages
kern.* /var/log/kern.log
daemon.* /var/log/daemon.log
syslog.* /var/log/syslog
lpr,news,uucp,local0,local1,local2,local3,local4,local5,local6.* /var/log/unused.log
Run the following commands:
# Execute the following command to restart rsyslogd
# pkill -HUP rsyslogd
Default Value:
OS Default: No