Previous Topic: Policy Execution ActionNext Topic: Security Log Alert Action


Security Log Access Action

The Security Log Access action expresses information on access to security logs.

Information

Level

Source - User Information

Primary

Source - Host Information

Tertiary

Source - Object Information

Tertiary

Source - Process Information

Tertiary

Source - Group Information

Tertiary

Dest - User Information

Tertiary

Dest - Host Information

Primary

Dest - Object Information

Secondary

Dest - Group Information

Tertiary

Agent - Information

Primary

Agent - Host Information

Primary

Event Source - Host Information

Primary

Event Source - Information

Tertiary

Event - Information

Primary

Result - Information

Primary

Result

event_result

event_severity

Success

S

2

Failure

F

3