I.9 Auditing System Users

It is the nature of the Linux operating system and the POSIX security model that the root user has access to all system information stored on the local server. Due to this fact, some organizations choose to monitor the activities of privileged users.

If you are interested in monitoring such activities, two Novell products can assist you.