No. |
Auditable Events |
Protection Level |
Success |
Failure |
Red Hat Linux syscall Audit Flag(s) |
1 |
Logons |
1-5 |
X |
X |
Audit Default |
2 |
Logoffs |
1-5 |
|
X |
Audit Default |
3 |
Security relevant directories, objects, and incidents (DAC) |
1-5 |
X |
X |
open, creat |
4 |
System Console activities |
1-5 |
|
X |
chmod, fchmod, chown, chown32, fchown, fchown32, lchown, lchown32, creat, open, truncate, truncate64, ftruncate, ftruncate64, ulink, rename, link, symlink, mknod, mount, umount, umount2, clone, fork, vfork, umask, adjtimex, settimeofday |
5 |
Use of Privileged/Special Rights |
1-5 |
|
X |
chmod, fchmod, chown, chown32, fchown, fchown32, lchown, lchown32, creat, open, truncate, truncate64, ftruncate, ftruncate64, ulink, rename, link, symlink, mknod, mount, umount, umount2 |
6 |
Root Level Access |
1-5 |
X |
X |
chown, chown32, fchown, fchown32, lchown, lchown32, adjtimex, settimeofday |
7 |
Uploads from local devices |
1-5 |
X |
X |
mount, umount, umount2 |
8 |
Writes/Downloads to local devices(A drives, Jazz drives, Printers) |
1-5 |
X |
|
mount, umount, umount2 |
9 |
System Restarts/Shutdowns |
1-5 |
X |
X |
reboot |
10 |
Change of users formal access permissions |
3-5 |
X |
X |
N/A |
11 |
Information downgrades and overrides |
4-5 |
X |
X |
N/A |
12 |
Attempted access to objects or data whose labels are inconsistent with user privileges |
4-5 |
|
X |
N/A |
13 |
Changes to security labels |
4-5 |
X |
X |
chmod, fchmod, chown, chown32, fchown, fchown32, lchown, lchown32, umask |