Windows and UNIX/Linux Audit Events
Review the following examples to understand the Windows and UNIX/Linux audit event logs, and then review how to read audit event data to understand the similarities and differences.
Windows Audit Event Log Line Example
The following is an example of a Centrify audit event recorded in the Windows application event log. Standard Windows audit event fields (in black) contain information about the Centrify event. Centrify augments these standard fields with additional data (in red) to help you to track logon and privilege activity data.
04/05/2016 02:15:37 PM LogName=Application
SourceName=Centrify AuditTrail V2 EventCode=6003
EventType=4 Type=Information
ComputerName=member.acme.vms User=NOT_TRANSLATED
Sid=S-1-5-21-3789923312-3040275127-1160560412-500
SidType=0 TaskCategory=%1 OpCode=Info RecordNumber=51645
Keywords=Classic Message=Product: Centrify Suite Category:
DirectAuthorize - Windows Event name: Remote login success
Message: User successfully logged on remotely using role
'ROLE_Windows_Local_Accounts/Global'.
Apr 05 14:15:37 member.acme.vms dzagent[1496]: INFO AUDIT_TRAIL|Centrify
Suite|DirectAuthorize - Windows|1.0|3|Remote login success|5|user=
administrator@member.acme.vms userSid=S-1-5-21-
3789923312-3040275127-1160560412-500 sessionId=6 CentrifyEventID=6003
DAInst=AuditingInstallation DASessID=c72252aa-e616-44ff-a5f6-d3f53f09bb67
role=ROLE_Windows_Local_Accounts/Global
desktopguid=a16f50d8-179b-4d47-93ed-14c10ca76d63
Windows Audit Event Log Line Information
The following table provides definitions for each field type and name with their associated field value for the previous example.
Windows Audit Event Log Line Information
Field Type | Field Name | Sample Field Value |
---|---|---|
Syslog header fields | Timestamp | Apr 05, 2016 02:15:37 PM |
Host Name | member.acme.vms | |
Process Name | dzagent | |
Process ID | 1496 | |
Log Level | INFO | |
Centrify audit event header fields | Event Type | AUDIT_TRAIL |
Product | Centrify Suite | |
Category | privilege elevation service - Windows | |
Product Version | 1.0 | |
Event ID | 3 | |
Event Name | Remote login success | |
Severity | 5 | |
Centrify audit event common fields for Windows | user | administrator@member.acme.vms |
userSid | S-1-5-21-3789923312-3040275127-1160560412-500 | |
DAInst | AuditingInstallation | |
DASessID | c72252aa-e616-44ff-a5f6-d3f53f09bb67 | |
sessionId | 6 | |
CentrifyEventID | 6003 | |
Centrify audit event-specific fields | role | ROLE_Windows_Local_Accounts/Global |
desktopguid | a16f50d8-179b-4d47-93ed-14c10ca76d63 |
UNIX/Linux Audit Event Log Line Example
The following is an example of a UNIX/Linux audit event. Centrify audit event information is highlighted in red.
Apr 4 21:04:15 engcen6 adclient[1749]: INFO
AUDIT_TRAIL|Centrify Suite|Centrify sshd|1.0|100|SSHD granted|5|user=
dwirth(type:ad,dwirth@acme.vms) pid=7456 utc=1459784055479
CentrifyEventID=27100DAInst= AuditingInstallation
DASessID=c72252aa-e616-44ff-a5f6 -d3f53f09bb67 status=GRANTED
service=ssh-connection tty=/dev/pts/0 authMechanism=keyboard-interactive client=
192.168.81.11 sshRights=shell command=(none)
UNIX/Linux Audit Event Log Information
The following table provides definitions for each field type and name with their associated field value for the previous example.
UNIX/Linux Audit Event Log Information
Field Type | Field Name | Sample Field Value |
---|---|---|
Syslog header fields | Timestamp | Apr 4 21:04:15 |
Host Name | engcen6 | |
Process Name | adclient | |
Process ID | 1749 | |
Log Level | INFO | |
Centrify audit event header fields | Event Type | AUDIT_TRAIL |
Product | Centrify Suite | |
Category | Centrify sshd | |
Product Version | 1.0 | |
Event ID | 100 | |
Event Name | SSHD granted | |
Severity | 5 | |
Centrify audit event common fields | user | dwirth(type:ad,dwirth@acme.vms) |
pid | 7456 | |
utc | 1459784055479 | |
CentrifyEventID | 27100 | |
DAInst | AuditingInstallation | |
DASessID | c72252aa-e616-44ff-a5f | |
service | ssh-connection | |
Centrify audit event-specific fields | tty | /dev/pts/0 |
authMechanism | keyboard-interactive | |
client | 192.168.81.11 | |
sshRights | shell | |
command | (none) |