18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Auditing on the <strong>Sidewinder</strong> <strong>G2</strong><br />

18-20 Monitoring, Auditing, and Reporting<br />

Line 1: This line lists the date and time, the facility that audited the<br />

message (such as the Kernel, FTP or Telnet), the location, known<br />

as the area), in the facility that audited the message (such as<br />

general area or <strong>Sidewinder</strong> <strong>G2</strong> library), the type <strong>of</strong> audit message<br />

(such as Domain Definition Table Type Enforcement violation or<br />

access control list) and the priority <strong>of</strong> the message (such as major<br />

or minor).<br />

Note: Network probe attempts do not contain lines two or three.<br />

Line 2: This line lists the process ID, the real user ID, the effective<br />

user ID, the process group ID, the process family ID (<strong>Sidewinder</strong><br />

<strong>G2</strong>-specific) and the command associated with the process ID.<br />

Line 3: This line lists the real domain the process is running in and<br />

the effective domain (the domain that the process for which<br />

permission is given).<br />

Lines 4 and 5: These lines provide eight pieces <strong>of</strong> data. The fourth<br />

line, which always begins with “permwanted,” contains the integer<br />

representation <strong>of</strong> the permissions requested by the process and<br />

granted to the process, the domain <strong>of</strong> the requesting process, and<br />

the type <strong>of</strong> file that the process is requesting access to. The fifth<br />

line contains the filename and the permissions wanted and granted<br />

for the file.<br />

In general, the data in an audit message is a tag name followed by a<br />

colon and the value <strong>of</strong> the tag. Table 18-3 contains examples and<br />

descriptions <strong>of</strong> some <strong>of</strong> the tags used in audit messages that appear in<br />

the audit results window.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!