
XYGATE
®
Data Protection
™
Reference Manual
XYPRO Technology Corporation
70
Proprietary and Confidential
In the example below, user
QATSTSW.MGR
was denied to access the file
$SYSTEM.xdptest.encrfile
. Hence, the message got prefixed with the text
DP_CR
.
DP_CR 2014-01-09 11:02:43.848864183255QATSTSW.MGR
0.139577$SYSTEM.XDPTEST.ENCRFILE 98ENCRYPTDECRYPT312001NNGUARDIAN
\N1.$Y3QP.#IN \N1.$:0:154:499282116
$SYSTEM.XYGATEDP.WR \N1.$:0:154:4992800000203DPGROUP GUARDIAN
ACCESS NO $SYSTEM.XDPTEST.ENCRFILE
A6:
AUDIT_ACCESS_FAIL
This keyword determines whether or not XDP will write denied access attempts to the
XDP audit logs.
Syntax:
AUDIT_ACCESS_FAIL { ON | OFF }
If ON, denied access attempts will be audited.
If OFF, denied access attempts will not be audited.
The default value is OFF.
Note:
This value is set in the DPCONF file during installation, but can be overridden by
individual DPGroup entries in the DPACL file.
A7:
AUDIT_ACCESS_PASS
This keyword determines whether or not XDP will write successful access attempts to
the XDP audit logs.
Syntax:
AUDIT_ACCESS_PASS { ON | OFF }
If ON, successful access attempts will be audited.
If OFF, successful access attempts will not be audited.
The default value is OFF.
Note:
This value is set in the DPCONF file during installation, but can be overridden by
individual DPGroup entries in the DPACL file. So if your policy is not to audit
successful access attempts but you want to know every time a particularly
sensitive file is accessed for the individual DPGROUP that protects that file, you
would set this value to ON. The value in the DPCONF file, however, would be
OFF.