Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Guide to the Secure Configuration of Red Hat Enterprise Linux 7
System Settings
Installing and Maintaining Software
System and Software Integrity
Endpoint Protection Software
Install Intrusion Detection Software
Install Intrusion Detection Software
An XCCDF Rule
Details
Profiles
Prose
Install Intrusion Detection Software
High Severity
The base Red Hat Enterprise Linux 7 platform already includes a sophisticated auditing system that can detect intruder activity, as well as SELinux, which provides host-based intrusion prevention capabilities by confining privileged programs and user sessions which may become compromised.