home *** CD-ROM | disk | FTP | other *** search
-
- Chapter 4
-
- Audits
-
- PROTEC Audits allow you to track computer
- operations a user may perform while logged onto a
- PROTEC NET workstation. These operations are
- referred to as Events. If an event is checked
- then it is audited, otherwise it is not.
-
- Audit events are stored locally on the workstation
- and are copied up to the appropriate Security
- Server when a user logs onto the system.
-
- =========
- Events
- =========
-
- PROTEC provides detailed Audits of user
- operations, supervisors included. The events
- checked in the window below are the default
- settings when the system is first installed.
-
- Audits record the user who is performing the
- audited events, DOS's date and time the event
- occurred and a detailed description of the action.
- Audit records may be viewed by creating an Audit
- Report. Refer to Reports for more information.
-
-
- CAUTION PROTEC Audits obtain the system's date and time
- from DOS. If you do not want the computer's date and time
- to be changed by users of the system, deny access to the
- clock.
-
- Group 1 Audit | Description
- Event |
- _______________|________________________
- Configuration | Tracks changes to the
- Changes | security system while
- | within PSECURE.EXE.
- Login/Logoff | Tracks user attempts to
- Time | login or logoff the system.
- Password | Logs password changes using
- Changes | the text: 'Changed
- | Password.'
- Violations | Tracks attempts to access
- | resources that a user has
- | not been granted permission
- | to access.
-
- Figure 4.2. Group 1 Audit Events
-
-
- Group 2 Audit | Description
- Event |
- ______________|_____________________________
- Chdir | Tracks user and application
- | attempts to change
- | directories.
- Clock | Tracks user and application
- | attempts to change the
- | system clock.
- Comm Ports | Tracks user and application
- | attempts to use COM1:,
- | COM2:, COM3: or COM4.
- Create | Tracks user and application
- | attempts to create a file.
- Delete | Tracks user and application
- | attempts to delete a file.
- Execute | Tracks user and application
- | attempts to execute a
- | program.
- MkDir | Tracks user and application
- | attempts to make a
- | directory.
- Open | Tracks user and application
- | attempts to open a file.
- Printer | Tracks user and application
- | attempts to send
- | information to LPT1:,
- | LPT2:, LPT3: or LPT4:.
- Read | Tracks user and program
- | attempts to read a file.
- Rename | Tracks user and program
- | attempts to rename a file.
- Rmdir | Tracks user and application
- | attempts to remove a
- | directory.
- TSR | Tracks user attempts to
- | load a TSR.
- View Directory| Tracks user and application
- | attempts to view files or
- | directories using DOS's
- | Find First, Find Next
- | functions.
- Write | Tracks user and program
- | attempts to write to a
- | file.
-
- Figure 4.3. Group 2 Audit Events
-
-
- To Select Events to Audit
-
- 1 Access the Security program. Refer to
- Accessing the Security Program for step by step
- instructions.
-
- 2 From the Workstation menu, select Events to
- Audit (ALT, W, E).
-
- 3 Select the workstation you wish to configure
- audit events.
-
- 4 Check the events you wish to audit. Use the
- TAB key to move the highlight bar. Press the
- SPACEBAR to check the event you wish to audit.
- If you wish to audit all events, press the F3
- key.
-
- 5 Choose the SAVE button. Changes will not take
- effect until a user logs onto the system.
-
- ====================
- Delete Audit Records
- ====================
-
- PROTEC NET allows you to delete all audit records.
- PROTEC confirms your request prior to deleting all
- audit records. If you would like to create an
- ASCII file of the Audit file prior to deletion,
- refer PROTEC NET Programs, PCVAUDIT.EXE
-
- To Delete Audit Records
-
- 1 Access the Security program. Refer to section
- Accessing the Security Program for step by step
- instructions.
-
- 2 From the File menu, select Delete Audit Records
- (ALT, F, D).
-
- 3 Choose the YES...Delete Records button to
- confirm.
-
- 4 Choose the OK button to end session.
-
- ========================
- Audit Database Structure
- ========================
-
- There are eight fields within an Audit record.
- This information can be viewed within the manual.
-