Print this page
NEX-13644 File access audit logging
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Reviewed by: Saso Kiselkov <saso.kiselkov@nexenta.com>
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>

Split Close
Expand all
Collapse all
          --- old/usr/src/man/man4/audit_class.4.man.txt
          +++ new/usr/src/man/man4/audit_class.4.man.txt
↓ open down ↓ 84 lines elided ↑ open up ↑
  85   85           0x00004000:ap:application
  86   86           0x000f0000:ad:old administrative (meta-class)
  87   87           0x00070000:am:administrative (meta-class)
  88   88           0x00010000:ss:change system state
  89   89           0x00020000:as:system-wide administration
  90   90           0x00040000:ua:user administration
  91   91           0x00080000:aa:audit utilization
  92   92           0x00300000:pc:process (meta-class)
  93   93           0x00100000:ps:process start/stop
  94   94           0x00200000:pm:process modify
       95 +         0x02000000:sa:SACL-based File Access Auditing
  95   96           0x20000000:io:ioctl
  96   97           0x40000000:ex:exec
  97   98           0x80000000:ot:other
  98   99           0xffffffff:all:all classes (meta-class)
  99  100  
 100  101  
 101  102  
 102  103  FILES
 103  104         /etc/security/audit_class
 104  105  
↓ open down ↓ 18 lines elided ↑ open up ↑
 123  124  SEE ALSO
 124  125         au_preselect(3BSM), getauclassent(3BSM), audit_event(4), attributes(5)
 125  126  
 126  127  NOTES
 127  128         It is possible to deliberately turn on the no class in the kernel, in
 128  129         which case the audit trail will be flooded with records for the audit
 129  130         event AUE_NULL.
 130  131  
 131  132  
 132  133  
 133      -                                 March 6, 2017                  AUDIT_CLASS(4)
      134 +                                 July 10, 2018                  AUDIT_CLASS(4)
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX