The seosd daemon detected that process ppp, which is running one of the registered login programs, made nnn attempts to specify a user/password combination with no success. CA ControlMinder concluded that a password guess attack originated at the terminal specified in the message text, and wrote an audit record to the CA ControlMinder audit file. PWATTACK audit records can trigger actions by the log routing daemons (selogrcd and selogrd).
| Copyright © 2013 CA. All rights reserved. |
|