Information
Set system audit so that audit rules cannot be modified with auditctl. Setting the flag '-e 2' forces audit to be put in immutable mode. Audit changes can only be made on system reboot.
Rationale:
In immutable mode, unauthorized users cannot execute changes to the audit system to potential hide malicious activity and then put the audit rules back. Users would most likely notice a system reboot and that could alert administrators of an attempt to make unauthorized audit changes.
Solution
Add the following lines to the /etc/audit/audit.rules file.
-e 2
Note: This must be the last entry in the /etc/audit/audit.rules file
Default Value:
OS Default: N/A