User session logging lets you trace user activities on the endpoint, replay the sessions, and view the commands the user entered during that session.
The session logger logs input for all programs listed in the /etc/shells file. For example, if /usr/bin/passwd is listed in /etc/shells and you use passwd to change your password, the seaudit utility displays your changed password when you display the session logs. We recommend that you review the /etc/shells file before you implement session logging.
The following process explains how user session logging works:
Customize the CA Access Control parameters file to enable Keyboard Logger.
Note: You can enable Keyboard Logger after installation in the seos.ini file.
Verify that the Keyboard Logger daemon, KBLAudMngr, is running. Use the issec utility to view the status of CA Access Control daemons.
eu user1 audit(interactive)
Check the Interactive box in the Audit tab of the User Properties window.
CA Access Control enables session logging for the user account.
/opt/CA/AccessControl/log
./seaudit -kbl -sid 65223 -rp
Note: For more information about the seaudit -kbl command, see the Reference Guide. We recommend that you integrate the CA Access Control endpoint with CA Enterprise Log Manager to collect user sessions from hosts in your enterprise and generate reports. For more information about the integration with CA Enterprise Log Manager, see the Implementation Guide.
| Copyright © 2012 CA. All rights reserved. |
|