Information
The /etc/syslog.conf file specifies rules for logging and which files are to be used to log certain classes of messages.
Rationale:
A great deal of important security-related information is sent via syslog (e.g., successful and failed su attempts, failed login attempts, root login attempts, etc.).
Solution
Edit the following lines in the /etc/syslog.conf file as appropriate for your environment:
auth,user.* /var/log/messages
kern.* /var/log/kern.log
daemon.* /var/log/daemon.log
syslog.* /var/log/syslog
lpr,news,uucp,local0,local1,local2,local3,local4,local5,local6.* /var/log/unused.log
Execute the following command to restart syslogd:
# pkill -HUP syslogd
Default Value:
OS Default: N/A