audit_event - audit event definition and class mapping
/etc/security/audit_event
/etc/security/audit_event is a user-configurable ASCII system file that stores event definitions used in the audit system. As part of this definition, each event is mapped to one or more of the audit classes defined in audit_class(5). See auditconfig(8) and user_attr(5) for information about changing the preselection of audit classes in the audit system.
The fields for each event entry are separated by colons. Each event is separated from the next by a NEWLINE. Each entry in the audit_event file has the form:
event-number:event-name:event-description:event-classes
The fields are defined as follows:
Event number. Ranges for event number are assigned as follows:
Reserved as an invalid event number.
Reserved for the Solaris Kernel events. The kernel event table, and possibly MAX_KEVENTS, must be updated in audit_kevents.h when changes are made to kernel events. Allocation of Solaris Kernel events:
The kernel event table must start with AUE_NULL
Allocated for Solaris
Reserved but not allocated
Allocated for user level audit events. Allocation of user level audit events:
Reserved but not allocated
Allocated for Solaris
Reserved but not allocated
Available for third party applications
Event name.
Event description.
Specifies classes to which the event is mapped. Classes are comma separated, without spaces and may be added for any event other than those with the no class.
Obsolete events are commonly assigned to the special class no (invalid) to indicate they are no longer generated. Obsolete events are retained to process old audit trail files. Other events which are not obsolete may also be assigned to the no class.
The following is an example of some audit_event file entries:
7:AUE_EXEC:exec(2):ps,ex 79:AUE_OPEN_WTC:open(2) - write,creat,trunc:fc,fd,fw 6152:AUE_login:login - local:lo 6153:AUE_logout:logout:lo 6154:AUE_telnet:login - telnet:lo 6155:AUE_rlogin:login - rlogin:lo
See attributes(7) for descriptions of the following attributes:
|
The file format stability is Committed. The file content is Uncommitted.
/etc/security/audit_event
audit_class(5), user_attr(5), auditconfig(8)
This functionality is available only if Solaris Auditing has been enabled.
For changes to this file to be effective immediately, refresh svc:/system/auditset:default. For example:
# svcadm refresh svc:/system/auditset:default
Third party developers wishing to use the audit interfaces must contact the Solaris Audit team through their Oracle representative.