The seosd daemon detected that process ppp, which is running one of the registered login programs, made nnn attempts to specify a user/password combination with no success. CA Access Control concluded that a password guess attack originated at the terminal specified in the message text, and wrote an audit record to the CA Access Control audit file. PWATTACK audit records can trigger actions by the log routing daemons (selogrcd and selogrd).
| Copyright © 2012 CA. All rights reserved. |
|