1 :Info: display_system_audit_flags: 1984-12-13 display_system_audit_flags
2
3 Syntax as a command: display_system_audit_flags
4
5
6 Function: Displays the system parameters that control auditing of user
7 access to system resources.
8
9
10 Notes: See also the set_system_audit_flags command.
11
12
13 Examples:
14
15 ! display_system_audit_flags
16 Covert channel auditing enabled,
17 threshold = company_sensitive,accounting,executive,payroll
18 Successful access auditing disabled.
19 Unsuccessful access auditing disabled.
20
21
22 :Info: set_system_audit_flags: 1985-03-25 set_system_audit_flags
23
24 Syntax as a command: set_system_audit_flags -control_args
25
26
27 Function: Sets the system parameters that control auditing of user
28 access to system resources.
29
30
31 Control arguments:
32 -covert_channel STR, -cch STR
33 specifies that all operations which may be used as a covert channel
34 be audited. Sending processes whose authorization is above the
35 threshold STR will be audited. Receiving processes will be audited
36 regardless of authorization. STR is an access class string
37 containing either short or long names.
38 -no_covert_channel, -ncch
39 specifies that auditing of operations because they may be used as
40 covert channels is to be turned off.
41
42
43 -successful_access STR, -sa STR
44 specifies that all operations on system resources which are granted
45 by the system are to be audited. Only those operations involving
46 resources equal to or above the threshold STR will be audited.
47 STR is an access class string containing either short or long names.
48 -no_successful_access, -nsa
49 specifies that auditing of operations on system resources which are
50 granted by the system is to be turned off.
51
52
53 -unsuccessful_access STR, -usa STR
54 specifies that all operations on system resources which are denied
55 by the system are to be audited. Only those operations involving
56 resources equal to or above the threshold STR will be audited.
57 STR is an access class string containing either short or long names.
58 -no_unsuccessful_access, -nusa
59 specifies that auditing of operations on system resources which are
60 denied by the system is to be turned off.
61
62
63 Access required: The user must have access to the highly privileged
64 gate hphcs_.
65
66
67 Notes: Some parameter settings can result in serious degradation of
68 system performance. The user should be aware of the implications
69 before setting the parameters.
70
71 Because some system operations may be categorized in more than one
72 way, they may be audited due to more than one auditing flag. For
73 example, a particular operation on a system resource which may also
74 be used as a covert channel will be audited due to either the covert
75 channel threshold or the successful access threshold or the
76 unsuccessful access threshold. Further, the per-process audit flags
77 may further control privileged or administrative operations.
78
79
80 This command will change only those auditing parameters as specified
81 in the control arguments. The other parameters are not modified.
82
83 See also the display_system_audit_flags command.
84
85
86 :hcom:
87
88
89
90 /****^ HISTORY COMMENTS:
91 1) change2020-04-22GDixon, approve2021-02-22MCR10088,
92 audit2021-05-27Swenson, install2021-05-27MR12.6g-0056:
93 Change first section title from "Syntax" to "Syntax as a command"
94 per guidelines for command info segments.
95 END HISTORY COMMENTS */
96
97
98