Previous Page: Enabling Volume Auditing  Next Page: Generating Volume Audit Reports

Changing a Volume Audit Configuration

As auditor, it is your responsibility to review your organization's auditing requirements and identify an auditing strategy for your network. This can range from auditing nothing to auditing all events for all users. It all depends on what you want to accomplish with auditing.

One advantage of auditing, even if you audit only a few events (for example, logins), is that it can help deter browsing and probing by logged in users.

This section describes how you can use AUDITCON's audit configuration menu to


Prerequisites


Procedure

  1. Choose Auditing Configuration from the Available audit options menu (101).

    AUDITCON displays menu 497, 498, or 499, which list more configuration options, depending on the setting of the ALLOW AUDIT PASSWORDS option and whether you have sufficient rights to the Audit File object. See Top-Level Menus for the definition of sufficient rights.

    Table 7 summarizes the algorithm AUDITCON uses to determine which menu it will display, based on the above two variables.


    Table 7. Volume Audit Configuration Menu Selection

    Allow Audit Passwords = ON Sufficient Rights Menu

    Yes

    Yes

    497

    Yes

    No

    498

    No

    Yes

    499

    No

    No

    499

    Figure 17
    Menu 497: Auditing Configuration

    Figure 18
    Menu 498: Auditing Configuration

    Figure 19
    Menu 499: Auditing Configuration

  2. Choose the desired configuration option, and press Enter.

    The first three entries (audit by event, file/directory, and user) allow you to preselect the events that the server will record in the audit file.

    Other entries allow you to define how the server manages audit files, to set passwords, to disable auditing, and to display the current audit status. These submenus are addressed in the following sections.

    WARNING:  When you make changes to the volume audit configuration, you may receive a message that AUDITCON was unable to update the Audit File object. If this occurs, your configuration changes could be lost.


Audit by Event

This section describes how you preselect file, queue management, server, and user audit events.

Preselection is the operation of telling the server, in advance, which types of audit events you want the server to record in an audit file. The server records the events you have preselected and ignores other events.

By preselecting the events that are important in your organization, you conserve the disk space and processor cycles required to record the other potential audit events.

Ten of the file system events described in this section permit options for user and/or file preselection as part of event selection. For example, file open-user and file will cause the server to record file opens only for selected users and only for selected files. For the remaining volume events, the default is that events you select will be recorded for all users of the volume. If you want to audit only certain specific users, you should

You cannot subsequently generate audit reports for events or users that were not preselected for auditing when the event occurred. For example, if you want to review logins made by a user two weeks ago, but you did not have logins preselected at that time, you will not be able to generate an audit report for these events.

You must balance your anticipated need of certain audit information with the resources required to audit those events.


Prerequisites


Procedure

  1. Choose Audit by event from the Auditing configuration menu (497, 498, or 499).

    AUDITCON displays menu 401, which lists the classes of audit events that you can preselect for auditing.

    Figure 20
    Menu 401: Audit by Event

    The following list introduces these seven classes of events and gives examples of the types of events that are included in each class.

    These events are usually associated with user actions performed at client workstations, and the audit record includes the identity of the user that requested the service.

    Event Class Description

    Accounting events

    Accounting events include operations to get and set account charges. Accounting events are always stored in the audit trail of volume SYS:.

    For instructions, see Audit by Accounting Events.

    Extended attribute events

    Extended attribute events include operations to get and set file extended attributes.

    For instructions, see Audit by Extended Attribute Events.

    File events

    File events include operations by network users on files or directories in the current volume. These include activities such as creating or deleting a directory, and creating, opening, closing, reading, writing to, and salvaging files.

    For instructions, see Audit by File Events.

    Message events

    Message events include operations to read and write interconnection messages. Message events are always stored in the audit trail of volume SYS:.

    For instructions, see Audit by Message Events.

    QMS events

    Queue Management Services (QMS) events include operations on the server's queues, such as requests to create or destroy a print queue. QMS events are always stored in the audit trail of volume SYS:.

    For instructions, see Audit by QMS Events.

    Server events

    This class of events includes actions performed at a specific server, such as server console commands, mounting a volume, or shutting down a server.

    For instructions, see Audit by Server Events.

    User events

    User events include activities such as bindery logins and logouts and trustee assignment changes.

    For instructions, see Audit by User Events.

    NOTE:  If you are configuring a volume other than SYS:, the menu items Accounting Events, Message Events, and QMS events will not be present.

  2. After preselecting events to be audited, press Esc to return to the Auditing configuration menu (497, 498, or 499).


Audit by Accounting Events


Procedure
  1. From the Audit by event menu (401), choose Audit by accounting events and press Enter to edit the list of preselected accounting events.

    AUDITCON displays menu 402, which lists the four accounting events.

    Figure 21
    Menu 402: Audit by Accounting Events

  2. Move the cursor to each event and press F10 to toggle it to the desired state (for example, OFF to ON).

  3. When you have set and reviewed the audit event configuration, press Esc to save the configuration.

    AUDITCON asks you to confirm the changes.

  4. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the audit events unchanged.

    If level 2 passwords are enabled, the user does not have NDS access, and the Allow Audit Passwords option is set to ON, AUDITCON will prompt for the level 2 password before making the change.


Audit by Extended Attribute Events


Procedure
  1. Choose Audit by extended attribute events from the Audit by event menu (401) and press Enter to edit the list of preselected extended attribute events.

    AUDITCON displays menu 404, which lists the four extended attribute events.

    Figure 22
    Menu 404: Audit by Extended Attribute Events

  2. Move the cursor to each event and press F10 to toggle it to the desired state (for example, OFF to ON).

  3. When you have set and reviewed the audit event configuration, press Esc to save the configuration.

    AUDITCON asks you to confirm the changes.

  4. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the audit events unchanged.


Audit by File Events

WARNING:  After you select file events, you must also go to the Audit by File/Directory menu shown in Figure 28 and/or the Audit by User menu shown in Figure 29 and in Figure 78 if you chose any file and user or file or user events. Selecting file and user or file or user events without selecting any files or users will not cause the recording of any audit events.


Procedure
  1. Choose Audit by file events from the Audit by event menu (401) and press Enter to edit the list of preselected file events.

    AUDITCON displays menu 405, which lists basic file events, basic directory events, and assorted other events. Because of the screen size, only 16 events are shown at one time, with the remainder of the events available using the Page Up, Page Down, and arrow keys.

    Figure 23
    Menu 405: Audit by File Events

    The following events can be displayed by scrolling the Audit by file events screen:

    File delete - user or file
    File open - global
    File open - user and file
    File open - user or file
    File purge
    File read - user and file
    File read - user or file
    File rename/move - global
    File rename/move - user and file
    File rename/move - user or file
    File salvage
    File search
    File write - user and file
    File write - user or file
    Generate directory base and volume number
    Get entry access rights
    Get reference count for directory entry
    Get specific information for entry
    Get user's effective rights
    Lock file
    Modify directory entry - global
    Modify directory entry - user and file
    Modify directory entry - user or file
    Obtain directory information
    Scan deleted files
    Scan trustee list
    Scan volume's user disk restriction
    Search specified directory
    Set compressed file size
    Set directory handle

    For file and directory auditing, the server provides a highly flexible selection mechanism that you can use to preselect specific file system events, generated by specific users, for accesses to specific files or directories. These preselection options (global, user and file, user or file) are described in the following list:

    Global. When you choose a global event (for example, File open-global), the server will audit all instances of that event (for example, file opens) in the current volume, for all users, for all files. Thus, when any user opens any file, the server will append an audit record to the volume audit trail that identifies the file open, the user, and the file.

    To cause global auditing of a file system event, you only need to choose the global event, for example, File open - global). You do not need to select specific files or users.

    User and File. When you choose a user and file event (for example, File open - user and event), the server audits the event only when it was performed by an audited user to an audited file or directory.

    Table 8 shows the audit events that will be recorded if you select the File open - user and file event, users ANN and BOB, and file FOO.EXE and BAR.DAT for auditing.


    Table 8. Examples of User and File Preselection

    User Open Of File Audited?

    ANN

    FOO.EXE

    Yes

    ANN

    BAR.EXE

    No

    BOB

    BAR.XXX

    No

    BOB

    BAR.DAT

    Yes

    CHARLES

    FOO.EXE

    No

    CHARLES

    BAR.XXX

    No

    To configure user and file auditing, (1) preselect the user and file event, (2) preselect the list of files and directories to be audited (Audit by File/Directory ), and (3) preselect the list of users to be audited (Audit by User in this section or Audit by User.

    User or File. When you select a user or file event (for example, File open - user or file), the server will audit the event when it is performed by an audited user or is performed to an audited file.

    For example, Table 9 shows examples of the audit events that will be recorded if the File open - user or file event, users ANN and BOB, and file FOO.EXE and BAR.DAT are selected for auditing.


    Table 9. Examples of User or File Preselection

    User Open Of File Audited?

    ANN

    FOO.EXE

    Yes

    ANN

    BAR.EXE

    Yes

    BOB

    BAR.XXX

    Yes

    BOB

    BAR.DAT

    Yes

    CHARLES

    FOO.EXE

    Yes

    CHARLES

    BAR.XXX

    No

    To configure user or file auditing, (1) preselect the user or file event, (2) preselect the list of files and directories to be audited (Audit by File/Directory), and (3) preselect the list of users to be audited (Audit by User in this section or Audit by User.

    WARNING:  When using user and file or user or file events, see the cautions in Audit by User or Audit by User. The set of users you identify is global; that is, they will be audited on all volumes, containers, and servers in your Directory tree, not just on a particular volume.

    Global auditing, particularly of common events such as file opens, can result in a high volume of audit events. Unless you closely monitor the status of the audit files that are collected by the server, this can cause the server to automatically take the volume offline when the audit files or volume are filled.

  2. Move the cursor to each event and press F10 to toggle it to the desired state (for example, OFF to ON).

    Enabling one event (for example, File open - user or file) will cause related events (for example, File open - global) to automatically change state.

  3. When you have set and reviewed the audit event configuration, press Esc to save the configuration.

    AUDITCON asks you to confirm the changes.

  4. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the audit events unchanged.


Audit by Message Events


Procedure
  1. Choose Audit by message events from the Audit by event menu (401) and press Enter to edit the list of preselected queue events.

    AUDITCON displays menu 406, which lists the five message events.

    Figure 24
    Menu 406: Audit by Message Events

  2. Move the cursor to each event and press F10 to toggle it to the desired state (for example, OFF to ON).

  3. When you have set and reviewed the audit event configuration, press Esc to save the configuration.

    AUDITCON asks you to confirm the changes.

  4. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the audit events unchanged.


Audit by QMS Events


Procedure
  1. Choose Audit by QMS events from the Audit by event menu (401) and press Enter to edit the list of preselected queue events.

    AUDITCON displays menu 407, which lists the events that are commonly used by network clients to submit and manage print queues.

    Because of the screen size, only 16 events are shown at one time, with the remainder of the events available using the Page Up, Page Down, and arrow keys.

    Figure 25
    Menu 407: Audit by QMS Events

    The following events can be displayed by scrolling the Audit by QMS events screen:

    Queue set job priority
    Queue set status
    Queue start job
    Read queue job entry
    Read queue status
    Restore queue server rights
    Set print job environment
    Set queue server status

  2. Move the cursor to each event and press F10 to toggle it to the desired state (for example, OFF to ON).

  3. When you have set and reviewed the audit event configuration, press Esc to save the configuration.

    AUDITCON asks you to confirm the changes.

  4. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the audit events unchanged.


Audit by Server Events


Procedure
  1. Choose Audit by server events and press Enter to edit the list of preselected queue events.

    AUDITCON displays menu 408, which lists the server audit events. Because of the screen size, only 16 events are shown at one time, with the remainder of the events available using the Page Up, Page Down, and arrow keys.

    Figure 26
    Menu 408: Audit by Server Events

    The following events can be displayed by scrolling the Auditing by server events screen:

    Get semaphore information
    Get user disk utilization
    Map directory number to path
    NLM add audit record
    NLM add user ID record
    Remote add name space
    Remote dismount volume
    Remote execute file
    Remote load NLM
    Remote mount volume
    Remote set parameter
    Remote unload NLM
    Send console broadcast
    Server console broadcast
    Server console command
    Terminate service connection
    Verify server serial number
    Volume dismount
    Volume mount

  2. Move the cursor to each event and press F10 to toggle it to the desired state (for example, OFF to ON).

  3. When you have set and reviewed the audit event configuration, press Esc to save the configuration.

    AUDITCON asks you to confirm the changes.

  4. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the audit events unchanged.


Audit by User Events


Procedure
  1. Choose Audit by user events and press Enter to edit the list of preselected user events.

    AUDITCON displays menu 409, which lists seven events associated with server-centric bindery login sessions.

    Figure 27
    Menu 409: Audit by User Events

  2. Move the cursor to each event and press F10 to toggle it to the desired state (for example, OFF to ON).

  3. When you have set, and reviewed, the audit event configuration, press Esc to save the configuration.

    AUDITCON then displays menu 403 (shown previously) to confirm that you want to make the changes.

  4. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the audit events unchanged.


Audit by File/Directory

This section describes how to preselect files and directories in the volume for auditing.

NOTE:  After you preselect a file or directory for auditing, you must also go to the Audit by event and Audit by file events menus shown in the Changing a Volume Audit Configuration), then choose the user and file or user or file events you want to audit. Selecting a file or directory without the associated events will not cause the file to be audited.

WARNING:  The server keeps file and directory audit flags in the file system, but does not save that information when you back up the volume. If you ever restore files or directories from backup, the audit flags will be lost. Consequently, you must keep a manual record of all files and directories you've preselected for auditing in order to be able to restore that information.

Table 10 shows a sample form that you can use when recording which files and directories have been marked for auditing. You must keep a record of all such files and directories for recovery purposes. If the system is ever restored from a full backup, you will use this list to reconstruct your audit settings. In addition, if the administrator restores files or directories from a backup, you will want to use this record to reestablish your audit settings. Failure to keep and use such a record can result in loss of audit data.


Table 10. Sample Format for Recording File/Directory Settings

Date Time Set/-Cleared? Server Volume Path Name

23 Mar 95

2:50pm

Set

SERVER1

SYS:

\PUBLIC\NETADMIN.EXE

23 Mar 95

2:55pm

Set

SERVER1

ALPHA:

\USERS\SMITH

23 Mar 95

3:17pm

Set

SERVER2

ZETA:

\USERS\JONES

24 Mar 95

9:42am

Cleared

SERVER1

SYS:

\PUBLIC\NETADMIN.EXE

24 Mar 95

9:50am

Cleared

SERVER2

ZETA:

\USERS\JONES

24 Mar 95

1:35pm

Set

SERVER1

SYS:

\PUBLIC

24 Mar 95

1:50pm

Set

SERVER1

SYS:

\SYSTEM


Prerequisites


Procedure

  1. Choose Audit by file/directory from the Auditing configuration menu (497, 498, or 499).

    AUDITCON displays menu 410, which lists the contents of the current directory of the current volume. The following menu shows an example of a display for the PUBLIC directory.

    Figure 28
    Menu 410: Audit by File/Directory

    Accesses to a file are subject to auditing if either (a) the file itself is preselected for auditing or (b) the containing directory is preselected.

    For example, accesses to the file AUDITCON.EXE are subject to auditing because the file itself is preselected. Accesses to files in BACKUP, for example, BACKUP\FILE1 and BACKUP\FILE2, are subject to auditing because the BACKUP subdirectory is preselected for auditing.

    However, accesses to BACKUP\DIR1\FILE1 are not subject to auditing unless the BACKUP\DIR1 subdirectory is preselected. Thus, setting the audit preselection flag for a directory only affects the audit status of files that are immediately contained in that directory.

    Auditing is also subject to the File and user and File or user criteria that were selected.

    When you create a subdirectory, the new subdirectory inherits the value of the audit preselection flag from its parent directory. Thus, if you create the BACKUP\DIR2 and BACKUP\DIR2\DIR3 subdirectories, they inherit the audit flag from the BACKUP directory. Any files in these subdirectories are subject to auditing.

    The inheritance of audit preselection flags applies only when a subdirectory is created. If you preselect the BACKUP directory for auditing, the audit flag does not flow down to existing subdirectories, such as BACKUP\DIR1.

    WARNING:  Because audit preselection flags are not saved when you back up a volume, and because audit flags are inherited when you create a subdirectory within an audited directory, you can end up auditing more directories than shown in your manual audit log.

    For example, if you flag the directory \A\B for auditing and then create the \A\B\C subdirectory, \A\B\C will inherit the audit flag from \A\B. If the volume is then backed up and restored, your audit flag log only shows \A\B as being audited.

    To prevent problems with this feature, log any important subdirectories that inherit audit flags. If you log enough information to manually restore the audit flags for all directories you want to audit, you don't need to be concerned about the loss of audit flags for other directories.

  2. Move through the Directory tree by pressing Enter to browse a subdirectory in the current menu, choosing .. to browse the parent directory, or choosing \ to return to the root directory.

    The AUDITCON window displays only 16 entries at a time, so you might need to use the arrow keys to scroll through a directory.

  3. Move the cursor to a desired entry and press F10 to toggle it to the desired state (for example, OFF to ON).

  4. When you have set and reviewed the audited files and directories, press Esc to save the configuration.

    AUDITCON asks you to confirm the changes.

  5. Choose Yes to save the changes and return to menu 410, or choose No to leave the audit events unchanged.


Audit by User

This section describes how you preselect specific users for volume auditing. When you preselect a user for auditing, the server associates this audit flag with the NDS User object. The server then consults this per-user audit flag as follows:

By default, the User restriction flag is not set, so selection by user only applies to the user or file and user and file events. If you want to preselect by user for all volume events, you must set the User restriction flag for the volume.

After you preselect a user for auditing, you must also perform the following tasks to ensure that the user's actions are recorded in the volume audit file:

When you select a user for volume auditing, the selection applies to all volumes and containers in the network where preselection is in effect. For example, selecting BOB for certain user or file events on volume SYS: also selects BOB for all user or file and user and file events selected for all other volumes on all other servers in the network. Similarly, selecting JANE for volume auditing will cause JANE to be audited on all containers where the User restriction flag is set to Yes.

A side effect of this is that you can select a user for auditing using either the Audit by user menu or the corresponding Audit by DS users menu under NDS auditing. Both have the same effect.

WARNING:  The server keeps user audit flags in the associated User objects in NDS but does not save that information when you back up NDS. If you ever restore NDS from a backup, the audit flags will be lost. You must keep a manual record of all users you've preselected for auditing in order to restore that information.

If an auditor has rights to audit any volume or container in the network, that auditor can enable or disable auditing for any user in the NDS tree.

Table 11 shows a sample format for recording which users have been marked for auditing. You must keep a record of all such users for recovery purposes. If NDS is ever restored from a full backup, you will use this list to reconstruct your audit settings. Failure to keep such a record and use it can result in loss of audit data.


Table 11. Sample Format for User Settings

Date Time Set/Cleared NDS User Object Name

23 Mar 96

3:45pm

Set

CN=SALLY.O=ACME

23 Mar 96

3:48pm

Set

CN=HENRY.O=ACME

24 Mar 96

8:12am

Set

CN=FRED.OU=SALES.O=ACME

25 Mar 96

11:32am

Clear

CN=SALLY.O=ACME

25 Mar 96

11:50am

Set

CN=JULIE.OU=ENGR.O=ACME

NOTE:  Because NDS is a distributed system and some servers might be offline at any given time, selecting a user for auditing might involve a long delay before NDS can synchronize this information throughout the network.


Prerequisites


Procedures

  1. Choose Audit by user from the Auditing configuration menu (497, 498, or 499).

    AUDITCON displays menu 420, which lists the users on the server. The list of users displayed is those users in the default bindery context for the server where the volume is located.

    The AUDITCON window shows only 16 entries at a time, so you might need to use the arrow keys to scroll through the list of users.

    WARNING:  The list of users shown is not the complete list of potential users of the volume. To see (and mark) users other than those listed here, see Audit by User. You will be working in the NDS auditing menu tree.

    Figure 29
    Menu 420: Audit by User

  2. Move the cursor to a desired entry and press F10 to toggle it to the desired state (for example, OFF to ON).

  3. When you have set and reviewed the list of audited users, press Esc to save the configuration.

    AUDITCON asks you to confirm the changes.

  4. Choose Yes to save the changes and return to menu 420, or choose No to leave the audit events unchanged.

    NOTE:  In addition to this method of preselecting users for auditing, you can also use an alternate method within the container auditing menu. See Audit by User.


Audit Options Configuration


Prerequisites


Procedure

  1. Choose Audit options configuration from the Auditing configuration menu (497, 498, or 499).

    AUDITCON displays menu 430, which defines the current audit configuration for the volume audit trail.

    Figure 30
    Menu 430: Audit Configuration

    The line Force dual-level audit passwords is omitted if the ALLOW AUDIT PASSWORDS console parameter is OFF.

    The following list describes the available configuration parameters. The server has two mechanisms for archiving the current audit file to an old audit file, and creating a new audit file. These are (1) automatic archiving, which causes the server to archive the audit file after a specified number of days, and (2) file overflow, which causes the server to archive the audit file when the current audit file exceeds the specified maximum size.

    In either case, the server closes the current audit file, archives the contents to an old audit file, and opens a new current audit file.

    The terms archive and archiving are used here to refer to a mechanism for rolling over the current audit file and starting a new current audit file. The process of saving copies of online audit files to removable media is referred to as backup.

    Audit File Size Parameter Description

    Audit file maximum size

    This parameter defines the maximum size (in bytes) of the audit file. However, because of the way the server processes audit events, the actual audit file size might slightly overrun this value. For example, if you intend to copy online audit files onto 1.44 MB diskettes, you might want to set the maximum file size to approximately 1.3 MB.

    Audit file threshold size

    This parameter defines the file size threshold (in bytes) at which the server sends a warning message to the server console and an entry to system log file. The threshold should be approximately 90% of the maximum file size. For example, a maximum setting of 1,000,000 bytes should have a threshold setting of 900,000 bytes.

    Overflow audit file size

    The audit overflow file holds audit data when the current audit file is full and the Disable auditable events option has been selected (see below). This file should be large enough to hold the maximum size audit record for each service process on the server, plus a reasonable amount to store records recording the auditor's actions to correct the overflow situation. The default setting is 100K (102400 bytes).

    Disk space for the overflow audit file is preallocated. The space you allocate is unavailable for other purposes. Therefore, you should be cautious when setting this value high to avoid running out of space for audit records. If you set it too high, you will waste space.

    These are the maximum sizes:

    • Volume audit record: 1024 bytes
    • Container audit record: 4096 bytes
    • External audit record: 4096 bytes

    You can find the number of service processes on the server using the MONITOR utility or by typing SET MAXIMUM SERVICE PROCESSES on the server console. The parameter default is 40. If your MAXIMUM SERVICE PROCESSES parameter is set to 60, the overflow audit file size should be set to at least 61,440 (60x1024) for a volume or 245,760 (60x4096) for a container or external audit trail.

    Automatic audit file archiving

    Set this parameter to Yes to cause the server to periodically archive the current audit file to an old audit file, as specified by the Days between audit archives setting. (The term archive refers to rolling the current audit file over to a new audit file, and does not imply any offline backup of the audit data, for example, to removable media).

    This setting ensures that the server maintains old audit information, but it might require large amounts of disk space, depending on the number of old audit files you decide to keep on the server. Use this parameter with the next three options.

    If you use this parameter, it can cause loss of audit data if the automatic archive overwrites old audit files that have not been previously backed up.

    Days between audit archives (1-255)

    Set the number of days the server will collect data in the current audit file before automatically archiving the file. You can select 1-255 days; the default is 7 days. This option is valid only when the Automatic Audit File Archiving is set to Yes.

    Hour of day to archive

    Set the hour of the day for auto archiving to take place. You can select any hour of the day, using a 24- hour clock (0-23). The default is 0 (midnight). The archive will usually begin a few seconds after the specified hour.

    This option relates only to periodic archiving of the audit file. It is valid only after you have turned on the auto-archive option.

    Number of old audit files to keep (115)

    This parameter defines how many old audit files the server will maintain online.

    When the server needs to archive the current audit file (either because of size overflow or periodic archiving), it compares the actual number of old audit files with this setting.

    If the actual number of old audit files is less than this value, the server creates another old audit file. If the number of old audit files has reached this value, the server performs overflow recovery according to one of these settings:

    • Archive audit file
    • Disable auditable events
    • Disable event recording.

    Warning: If you reduce the number of old audit files, then audit files in excess of the new number allowed will be deleted. Be sure you have backed up your old audit files before reducing the maximum number retained.

    Allow concurrent auditor logins

    Choose Yes to allow more than one auditor to have access to a volume audit trail at the same time.

    Broadcast errors to all users

    Choose No if you want error messages sent only to the server console.

    Broadcasting error messages increases network traffic and can lock users' workstation screens until they press Ctrl+Enter (or choose OK if running Microsoft* Windows*).

    Force dual-level audit passwords

    Choose Yes to require separate passwords for reading the audit data (level 1) and writing the configuration data (level 2).

    You are prompted to enter a level 2 password when you set this field to Yes for the first time. When you change the audit configuration, AUDITCON prompts for a level 2 password.

    This line will be blank if the ALLOW AUDIT PASSWORDS console parameter is set to off.

    The server provides three mutually exclusive options for handling full audit files and write errors caused by a full disk volume. The options are: Archive audit file, Disable auditable events, and Disable event recording. The default is Disable auditable events.

    You can select only one of these options at a time. As soon as you select any one, the other two will be turned off. If you don't select any, then Disable auditable events will be selected for you.

    These options are explained in the following table.

    Full Audit File Option Description

    Archive audit file

    With this setting, the server archives the current audit file (that is, changes the current audit file to an old audit file) and creates a new audit file.

    If necessary (because the maximum number of old audit files already exists), the server deletes the oldest of the old online audit files.

    Disable auditable events

    This setting lets the server place the volume in an overflow state when (a) the current audit file has reached the Audit file maximum size or (b) it cannot write to the current audit file (for example, the volume is full). The server doesn't try to roll over to a new audit file, even if there is disk space for archiving the current audit file.

    When a volume is in an overflow state, any NCP request which is potentially auditable is not allowed, even if that event would not cause an audit record to be generated.

    For example, in an overflow state, the server won't permit users to perform any file open operations on the volume, even if the event is not preselected for auditing. The effect is essentially the same as if the overflowed volume had been dismounted. To recover, you must reset the current audit file (see Reset Audit Data File.

    If volume SYS: overflows, the server permits an audit administrator to perform a read-only login to the server to reset the audit file. Other users aren't permitted to log in while volume SYS: is in an overflow state.

    This is the only overflow option that guarantees that you will not lose audit data. Consequently, if collecting audit data is very important, you should use this setting, even though it might inconvenience users who need to access the volume.

    Disable event recording

    This setting lets the server turn off auditing and stop entering new audit records into the current audit file when it reaches the maximum size limit or when an unrecoverable write error occurs for the audit file. The server doesn't try to create a new audit file, even if there is disk space to archive the current audit file.

    You must reset the current audit file in order to re-enable event recording. Until you re-enable event recording, users can access the volume without any audit coverage.

    Minutes between warning messages

    The server sends warnings to the console at this frequency if (a) the audit file is full and (b) the overflow option is configured to either Disable auditable events or Disable event recording.

    If you have the Archive audit file option configured, then a warning message is sent when the audit file is almost full, but there is no additional message when the archive occurs.

  2. Move the cursor to the field you want to change and enter the new configuration value.

    For numeric fields (for example, Audit file maximum size), type the new value into the field over the previous value, then press Enter. For Yes/No settings, type Y or N to change the value.

    Depending on the context of your change, the server might modify other values on the configuration screen. For example, if you set Automatic audit file archiving to No, the server will blank out the entries for Days between audit archives and Hour of day to archive.

  3. If you enable Force dual-level audit passwords and the ALLOW AUDIT PASSWORDS option is set to ON, AUDITCON will immediately prompt you (twice) to enter the new level 2 password.

  4. Review the settings on the current screen, and change any settings as required.

  5. Press Esc to exit the menu.

    AUDITCON asks you to confirm the changes.

  6. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the audit configuration unchanged.

    NOTE:  If you intend to back up audit files to high-density (1.44 MB) diskettes, set the maximum size of the audit file to approximately 1.3 MB to ensure that the audit file will fit on the disk.

    WARNING:  Audit files consume disk resources that might be needed by other users. Before you define the number and size of audit files, discuss your projected disk space requirements with an administrator for the server. If you set the audit file size too small, you risk shutting down the server volume or losing audit data, depending on the overflow option you've configured.

    The server does not provide any locking mechanism to prevent multiple auditors from simultaneously attempting to change volume, container, or external audit configuration data. If this occurs, the last auditor to write the audit configuration might overwrite changes made by other auditors. If more than one auditor has rights to modify the audit configuration, you must institute procedural methods to control access to the Audit File object, such as selecting a single replica of the Audit File object and making all changes to that replica.

    If you specify the Disable auditable events option, the server will stop processing auditable volume NCPTM requests when the current audit file fills up, even if there is sufficient disk space to roll over the audit file and start a new audit file. For example, you could have room for 15 online audit files, but the server will disable auditable NCP events when the current audit file fills up.

    To prevent this disruption, configure automatic audit file archiving so that the current audit file will not overflow during routine operation. For example, if it normally takes two days to fill an audit file, set Automatic audit file archiving to ON, Days between audit archives to one day, and Number of old audit files to at least 7. To prevent audit loss, you should monitor the audit status on a regular basis, and you must clean out the old audit files before the last audit file is used.

    If you configure both Automatic audit file archiving and the Archive audit file overflow option, the server will roll over the current audit file at both the appointed time and the specified file size. For example, if you're archiving audit files every Friday and the file becomes full on Thursday, the server will roll over the audit file on Thursday (overflow processing) and then again on Friday (automatic archival processing). Consequently, you might use up the configured number of old audit files (for example, 15) faster than anticipated. To prevent loss of audit data, you should monitor the audit status on a regular schedule and you must clean out the old audit files before the last file is used.


Change Audit Passwords

This section describes how the auditor can change level 1 audit passwords and level 2 audit passwords (if level 2 passwords are enabled). For information on using the password-based mechanism for accessing audit files, see Controlling Access to Online Audit Data.


Prerequisites


Procedure

  1. To change the level 1 password, choose Change audit password from the Auditing configuration menu (498).

  2. Enter the current (level 1) audit password.

    AUDITCON does not echo any password information to the screen.

    If dual-level passwords are enabled, AUDITCON prompts you to enter the level-2 password before you can change the level-1 password. AUDITCON allows you to change the level-2 password using the same procedure used to change the level-1 password.

  3. Enter the new (level 1) audit password when prompted by AUDITCON.

    AUDITCON prompts you twice for the new password. This ensures that the auditor did not make an error when entering the password.

    AUDITCON doesn't check the password for length, alphanumeric characters, or other characteristics of strong passwords, nor does it ensure that it is different from the previous password. Uppercase and lowercase characters are treated identically.


Set Audit Passwords

This section describes how to set level 1 audit passwords and level 2 audit passwords (if level 2 passwords are enabled). This section is applicable only if the ALLOW AUDIT PASSWORDS option is set to ON. For more information on using the password-based mechanism for accessing audit files, see Controlling Access to Online Audit Data.

WARNING:  The server's NetWare Enhanced Security configuration requires use of the NDS rights-based access control mechanism to protect audit data. For NetWare Enhanced Security networks, do not enable the password-based access control method (by setting ALLOW AUDIT PASSWORDS=ON at the server console) because this violates the assumptions under which the server was evaluated.


Prerequisites


Procedures

  1. To set the level 1 password, choose Set audit password from the Auditing configuration menu (1497).

    AUDITCON prompts you to enter the new (level 1) container password.

  2. Enter the new password.

    AUDITCON does not echo any password information to the screen

    If dual-level passwords are enabled, AUDITCON prompts you to set the level 2 password before you can set the level 1 password. AUDITCON allows you to set the level 2 password using the same procedure used to change the level 1 password.

  3. Reenter the new password.

    The dual prompt ensures that the auditor did not make an error when entering the new password.

    AUDITCON does not check the password for length, alphanumeric characters, or other characteristics of strong passwords, nor does it ensure that it is different from the previous password. Passwords are not case-sensitive.

WARNING:  If you use audit passwords to control access to the audit file, do not use your server password as the audit password.

NOTE:  If you use a password to control access to an audit file, and forget the audit password, then you must use the rights-based access, as described in Controlling Access to Online Audit Data. When you have access to the audit trail, you can reset the password as described in this procedure.


Disable Volume Auditing

When you disable volume auditing, you stop the server from recording audit events to the volume audit file, but you do not delete the Audit File object for the volume audit trail. The Audit File object remains and is reused (to provide an initial configuration) if you re-enable auditing for the volume. After volume auditing has been disabled, it can be re-enabled using the Enable Volume Auditing menu (see Enabling Volume Auditing).


Prerequisites


Procedures

  1. Choose Disable volume auditing from the Auditing configuration menu (497, 498, or 499).

    AUDITCON asks you to confirm that you want to disable auditing for the volume.

  2. Choose Yes and press Enter to disable auditing, or No to continue auditing.

    AUDITCON returns to menu 497, 498, or 499.


User Restriction

This menu provides for setting the following audit control flags in the current volume's Audit File object Audit Policy.

These flags pertain only to the currently selected volume and do not affect other volume or container audit files. Unlike the per-user audit flag (which is global across the network), the User restriction and Audit NOT_LOGGED_IN users flags must be set individually for each volume and container. The two flags are independent of each other, so you can set either flag without affecting the other.

WARNING:  If you set the User restrictions flag to Yes, you must also preselect those users you want audited, using the procedures shown in Audit by User or Audit by User. Setting the User restrictions flag to Yes without preselecting any users will mean that only User or File events (where the file is preselected) will be recorded in the audit trail.

If you set the User restrictions flag to Yes but leave the Audit NOT_LOGGED_IN users flag set as No, then actions of unauthenticated users will not be audited, unless they would otherwise be audited by selection of User or File events where the file is preselected.


Prerequisites


Procedures

  1. Choose User restriction from the Auditing configuration menu (497, 498, or 499).

    AUDITCON displays menu 480, which allows you to select the desired user restriction parameters for the volume.

    Figure 31
    Menu 480: User Restriction

  2. Review the settings on the current screen, and change any settings as required. Press Y to set a value to Yes or press N to set the value to No.

  3. When you are finished, press Esc to exit the menu.

    AUDITCON asks you to confirm your changes.

  4. Choose Yes to save the changes and return to menu 497, 498, or 499, or choose No to leave the user restrictions configuration unchanged.



  Previous Page: Enabling Volume Auditing  Next Page: Generating Volume Audit Reports