Outbound network connection events indicate outbound traffic to the protected host. Outbound network events are audited in two forms (according to the class activation in the local database). Both audit event types contain identical information but in different view. For example, one audit event contains HOST as the class name while the other event displays TCP as the class name.
Audit records in this event have the following format:
Date Time Status Class Service UserName Details Reason Host Program Terminal AuditFlags
Identifies the date the event occurred.
Format: DD MMM YYYY
Note: CA ControlMinder Endpoint Management formats the date display according to your computer's settings.
Identifies the time the event occurred.
Format: HH:MM:SS
Note: CA ControlMinder Endpoint Management formats the time display according to your computer's settings.
Indicates the return code for the event.
Values: Can be one of:
Identifies the name of the class.
Identifies the name of the service that the connection used.
Identifies the name of the accessor that performed the action that triggered this event.
Indicates at which stage CA ControlMinder decided what action to take for this event.
Note: The audit record you see in a non-detailed seaudit output displays a number in this field. This number is known as the authorization stage code. In a detailed output or in CA ControlMinder Endpoint Management, the audit record displays the message associated with the authorization stage code. For a complete list of stage codes, run seaudit -t.
Indicates the reason that CA ControlMinder wrote an audit record.
Note: This field does not display in a detailed seaudit output or in CA ControlMinder Endpoint Management. The audit record you see in a non-detailed seaudit output displays a number in this field. This number is known as the reason code. For a complete list of reason codes, run seaudit -t.
Identifies the name of the target host.
Identifies the name of the program that triggered the event.
Identifies the name of the terminal that the accessor used to connect to the host.
Identifies the accessor's session ID.
Note: By default this field does not appear in a non-detailed seaudit output. To display this field in a non-detailed seaudit output, specify the -sessionid option in the seaudit command. The user logon session ID field is added only to events that were generated as a result of TCP or CONNECT class definitions.
Indicates whether the accessor is internal (CA ControlMinder database user) or an enterprise user.
Note: If the accessor is an enterprise user, the audit record you see in a non-detailed seaudit output displays the string "(OS user)" in this field. Otherwise, this field remains empty.
Example: Outbound Network Connection Event Message
The following audit record was taken from a detailed seaudit output.
21 Jan 2009 15:37:43 D TCP telnet root 408 2 computer.org /usr/bin/telnet computer.com Event type: Outbound network connection Status: Denied Host name: computer.org Service: telnet Program: /usr/bin/telnet User name: Administrator Terminal: computer.com User name: root Date: 21 Jan 2009 Time: 15:37:43 Details: Default access of TCP service User Logon Session ID: 4977248c:0000012a5248 Audit flags: AC database user
This audit record indicates that on January 21st, 2009, the administrator opened an outgoing connection from the terminal computer.org to the computer named computer.com via the telnet service. CA ControlMinder denied this operation because of the defaccess property of the TCP record. (authorization stage code 408—Default of TCP service).CA ControlMinder logged this event because the AUDIT_MODE property for the accessor matches the record's result. (reason code 2—User audit mode requires logging).
Copyright © 2013 CA Technologies.
All rights reserved.
|
|