For maintenance purposes, sometimes you want to prevent events from being audited.
Before You Begin
You must assume the root role. For more information, see Using Your Assigned Administrative Rights in Securing Users and Processes in Oracle Solaris 11.3.
For example, events 6214 and 6215 belong to the user administration, ua, class.
## audit_event file ... 6214:AUE_kadmind_auth:authenticated kadmind request:ua 6215:AUE_kadmind_unauth:unauthenticated kadmind req:ua ...
Change these events to the no class.
## audit_event file ... 6214:AUE_kadmind_auth:authenticated kadmind request:no 6215:AUE_kadmind_unauth:unauthenticated kadmind req:no ...
If the ua class is currently being audited, existing sessions will still audit events 6214 and 6215. To stop these events from being audited, you must update the users' preselection masks by following the instructions in How to Update the Preselection Mask of Logged In Users.
Caution - Never comment out events in the audit_event file. This file is used by the praudit command to read binary audit files. Archived audit files might contain events that are listed in the file.
# auditconfig -conf Configured 283 kernel events.