Resources / Guides / How to Know What Changed on Your Linux System

How to Know What Changed on Your Linux System

A baseline-first workflow to move from uncertainty to evidence-backed change visibility.

Short answer

If you want to know what changed on Linux, you need a trusted reference and a comparison step. Without both, you can inspect files and logs forever and still miss important context.

The practical sequence is: capture state, explicitly set baseline trust, then compare current state to that baseline. This turns “something feels off” into a concrete drift list you can review. For command-level choice between fast and deep checks, use Preflight vs Compare.

Key takeaway

Terms that matter for change visibility

Run a repeatable baseline-first sequence

auditwalk scan run
auditwalk baseline set --scan-id <scan_id>
auditwalk preflight run
auditwalk compare run --format json

Why this order matters:

  1. scan run captures observed state facts.
  2. baseline set marks what you explicitly trust as the reference.
  3. preflight run gives a fast confidence check before risky actions.
  4. compare run gives the full drift set for triage.

What changed vs what matters

Drift type Initial interpretation Next action
Expected package/config updates Likely routine change Document and keep baseline continuity
Unexpected startup/persistence artifacts Potential high-risk drift Run deeper compare scope and investigate before proceeding
Unknown binaries or scripts in sensitive paths Unresolved trust condition Treat as unresolved until validated

Avoid false confidence

References

Keep reading

Preflight vs Compare: When to Use Each on Linux What to Do After Suspected System Drift System Integrity Monitoring for Individuals and Small Teams

By: AuditWalk Team · Reviewed: 14.04.26 · Last updated: 14.04.26 · Source class: official standards + product docs