| No. | Auditable Events | Protection Level | Success | Failure | Red Hat Linux syscall Audit Flag(s) |
| 1 | Logons | 1-5 | X | X | Audit Default |
| 2 | Logoffs | 1-5 | X | Audit Default | |
| 3 | Security relevant directories, objects, and incidents (DAC) | 1-5 | X | X | open, creat |
| 4 | System Console activities | 1-5 | X | chmod, fchmod, chown, chown32, fchown, fchown32, lchown, lchown32, creat, open, truncate, truncate64, ftruncate, ftruncate64, ulink, rename, link, symlink, mknod, mount, umount, umount2, clone, fork, vfork, umask, adjtimex, settimeofday | |
| 5 | Use of Privileged/Special Rights | 1-5 | X | chmod, fchmod, chown, chown32, fchown, fchown32, lchown, lchown32, creat, open, truncate, truncate64, ftruncate, ftruncate64, ulink, rename, link, symlink, mknod, mount, umount, umount2 | |
| 6 | Root Level Access | 1-5 | X | X | chown, chown32, fchown, fchown32, lchown, lchown32, adjtimex, settimeofday |
| 7 | Uploads from local devices | 1-5 | X | X | mount, umount, umount2 |
| 8 | Writes/Downloads to local devices(A drives, Jazz drives, Printers) | 1-5 | X | mount, umount, umount2 | |
| 9 | System Restarts/Shutdowns | 1-5 | X | X | reboot |
| 10 | Change of users formal access permissions | 3-5 | X | X | N/A |
| 11 | Information downgrades and overrides | 4-5 | X | X | N/A |
| 12 | Attempted access to objects or data whose labels are inconsistent with user privileges | 4-5 | X | N/A | |
| 13 | Changes to security labels | 4-5 | X | X | chmod, fchmod, chown, chown32, fchown, fchown32, lchown, lchown32, umask |