SENTRY User’s Guide
Section 3 - 17
Fitzgerald & Long
3.6 ACCESS VIOLATIONS REPORT
The SENTRY Access Violations Report is an audit report of violations logged by SENTRY for Database
Commands and for User Defined Items. Each attempt to use a restricted command by an unauthorized user
is reported here.
SENTRY.VIOLATION.REPORT SENTRY Access Violations 12:16:56 08-08-00
Key#
Date
Time
tty
Login Id
Pathname
Violation Item
===== =======
====
=============
========
============
==============
V27
08/04/95
01:55PM
/dev/pty/ttyp2
peggy
/usr/sentry.dev
Command
Executed -
DELETE VOC RTP3
One record listed.
Figure 41 -
This is a sample report of the SENTRY Violations Log. Each attempt to use a restricted
command by an unauthorized user is reported.
Each attempt to use a restricted command is logged in SENTRY's violation log and may also be displayed
at the system console if desired. The report of security violations show the date and time of occurrence, the
port, the user ID, the specific account where the violation occurred and the full command which was
attempted. Applications using SENTRY's User Defined Items may also create violation records which will
contain the user item being protected and a user specified comment, in addition to the standard information.
The System Administrator should print and review the Violations Report frequently in order to monitor
user actions. SENTRY allows the violation log to be purged selectively or in whole after the report has
been printed.
The following paragraphs describe the fields on this report.
Key#
- This is the record ID generated by SENTRY as a key to that specific violation entry.
Date/Time
- This is the date and time on which the violation occurred.
tty
- This field is the device to which the user was connected when the violation occurred.
Login ID
- This is the User ID in effect when the violation occurred.
Summary of Contents for Sentry
Page 4: ......
Page 18: ......
Page 21: ...SENTRY User s Guide Section 1 3 Fitzgerald Long ...
Page 29: ...SENTRY User s Guide Section 1 11 Fitzgerald Long ...
Page 30: ......
Page 60: ...Section 2 30 SENTRY User s Guide Fitzgerald Long ...
Page 102: ......
Page 109: ...SENTRY User s Guide Appendix 1 7 Fitzgerald Long ...
Page 110: ......
Page 113: ...SENTRY User s Guide Appendix 2 3 Fitzgerald Long ...