Configure grub or lilo so that processes that are capable of being audited can be audited even if they start up prior to auditd startup. Rationale: Audit events need to be captured on processes that start up prior to auditd, so that potential malicious activity cannot go undetected. [yes] Edit /etc/default/grub to include audit=1 as part of GRUB_CMDLINE_LINUX: GRUB_CMDLINE_LINUX=audit=1 And run the following command to update the grub configuration: # update-grub oval:org.secpod.oval:def:92214 oval:org.secpod.oval:def:85133 oval:org.secpod.oval:def:65967 SCAP Repo OVAL Definition 2023-08-23