-
Notifications
You must be signed in to change notification settings - Fork 127
Audit Message Dictionary
bfuzzy edited this page Oct 26, 2018
·
1 revision
MACRO NAME | VALUE | ORIGIN | CLASS | DESCRIPITON |
---|---|---|---|---|
AUDIT_GET | 1000 | USER | CTL | Get status |
AUDIT_SET | 1001 | USER | CTL | Set status (enable/disable/auditd) |
AUDIT_LIST | 1002 | USER | DEP | List syscall rules -- deprecated |
AUDIT_ADD | 1003 | USER | DEP | Add syscall rule -- deprecated |
AUDIT_DEL | 1004 | USER | DEP | Delete syscall rule -- deprecated |
AUDIT_USER | 1005 | USER | DEP | Message from userspace -- deprecated |
AUDIT_LOGIN | 1006 | KERN | IND | Define the login ID and information |
AUDIT_WATCH_INS | 1007 | USER | DEP | Insert file/dir watch entry |
AUDIT_WATCH_REM | 1008 | USER | DEP | Remove file/dir watch entry |
AUDIT_WATCH_LIST | 1009 | USER | DEP | List all file/dir watches |
AUDIT_SIGNAL_INFO | 1010 | USER | CTL | Get info about sender of signal to auditd |
AUDIT_ADD_RULE | 1011 | USER | CTL | Add syscall filtering rule |
AUDIT_DEL_RULE | 1012 | USER | CTL | Delete syscall filtering rule |
AUDIT_LIST_RULES | 1013 | USER | CTL | List syscall filtering rules |
AUDIT_TRIM | 1014 | USER | CTL | Trim junk from watched tree |
AUDIT_MAKE_EQUIV | 1015 | USER | CTL | Append to watched tree |
AUDIT_TTY_GET | 1016 | USER | CTL | Get TTY auditing status |
AUDIT_TTY_SET | 1017 | USER | CTL | Set TTY auditing status |
AUDIT_SET_FEATURE | 1018 | USER | CTL | Turn an audit feature on or off |
AUDIT_GET_FEATURE | 1019 | USER | CTL | Get which features are enabled |
AUDIT_USER_AUTH | 1100 | USER | IND | User system access authentication |
AUDIT_USER_ACCT | 1101 | USER | IND | User system access authorization |
AUDIT_USER_MGMT | 1102 | USER | IND | User account attribute change |
AUDIT_CRED_ACQ | 1103 | USER | IND | User credential acquired |
AUDIT_CRED_DISP | 1104 | USER | IND | User credential disposed |
AUDIT_USER_START | 1105 | USER | IND | User session start |
AUDIT_USER_END | 1106 | USER | IND | User session end |
AUDIT_USER_AVC | 1107 | USER | IND | User space AVC (Access Vector Cache) message |
AUDIT_USER_CHAUTHTOK | 1108 | USER | IND | User account password or PIN changed |
AUDIT_USER_ERR | 1109 | USER | IND | User account state error |
AUDIT_CRED_REFR | 1110 | USER | IND | User credential refreshed |
AUDIT_USYS_CONFIG | 1111 | USER | IND | User space system config change |
AUDIT_USER_LOGIN | 1112 | USER | IND | User has logged in |
AUDIT_USER_LOGOUT | 1113 | USER | IND | User has logged out |
AUDIT_ADD_USER | 1114 | USER | IND | User account added |
AUDIT_DEL_USER | 1115 | USER | IND | User account deleted |
AUDIT_ADD_GROUP | 1116 | USER | IND | Group account added |
AUDIT_DEL_GROUP | 1117 | USER | IND | Group account deleted |
AUDIT_DAC_CHECK | 1118 | USER | IND | User space DAC check results |
AUDIT_CHGRP_ID | 1119 | USER | IND | User space group ID changed |
AUDIT_TEST | 1120 | USER | IND | Used for test success messages |
AUDIT_TRUSTED_APP | 1121 | USER | IND | Trusted app msg - freestyle text |
AUDIT_USER_SELINUX_ERR | 1122 | USER | IND | SELinux user space error |
AUDIT_USER_CMD | 1123 | USER | IND | User shell command and args |
AUDIT_USER_TTY | 1124 | USER | IND | Non-ICANON TTY input meaning |
AUDIT_CHUSER_ID | 1125 | USER | IND | Changed user ID supplemental data |
AUDIT_GRP_AUTH | 1126 | USER | IND | Authentication for group password |
AUDIT_SYSTEM_BOOT | 1127 | USER | IND | System boot |
AUDIT_SYSTEM_SHUTDOWN | 1128 | USER | IND | System shutdown |
AUDIT_SYSTEM_RUNLEVEL | 1129 | USER | IND | System runlevel change |
AUDIT_SERVICE_START | 1130 | USER | IND | Service (daemon) start |
AUDIT_SERVICE_STOP | 1131 | USER | IND | Service (daemon) stop |
AUDIT_GRP_MGMT | 1132 | USER | IND | Group account attribute was modified |
AUDIT_GRP_CHAUTHTOK | 1133 | USER | IND | Group account password or PIN changed |
AUDIT_MAC_CHECK | 1134 | USER | IND | User space MAC (Mandatory Access Control) decision results |
AUDIT_ACCT_LOCK | 1135 | USER | IND | User's account locked by admin |
AUDIT_ACCT_UNLOCK | 1136 | USER | IND | User's account unlocked by admin |
AUDIT_USER_DEVICE | 1137 | USER | IND | User space hotplug device changes |
AUDIT_DAEMON_START | 1200 | USER | IND | Daemon startup record |
AUDIT_DAEMON_END | 1201 | USER | IND | Daemon normal stop record |
AUDIT_DAEMON_ABORT | 1202 | USER | IND | Daemon error stop record |
AUDIT_DAEMON_CONFIG | 1203 | USER | IND | Daemon config change |
AUDIT_DAEMON_RECONFIG | 1204 | USER | IND | Auditd should reconfigure |
AUDIT_DAEMON_ROTATE | 1205 | USER | IND | Auditd should rotate logs |
AUDIT_DAEMON_RESUME | 1206 | USER | IND | Auditd should resume logging |
AUDIT_DAEMON_ACCEPT | 1207 | USER | IND | Auditd accepted remote connection |
AUDIT_DAEMON_CLOSE | 1208 | USER | IND | Auditd closed remote connection |
AUDIT_DAEMON_ERR | 1209 | USER | IND | Auditd internal error |
AUDIT_SYSCALL | 1300 | KERN | SC | System call event information |
AUDIT_FS_WATCH | 1301 | KERN | DEP | Deprecated |
AUDIT_PATH | 1302 | KERN | SC | Filename path information |
AUDIT_IPC | 1303 | KERN | SC | System call IPC (Inter-Process Communication) object |
AUDIT_SOCKETCALL | 1304 | KERN | SC | System call socketcall arguments |
AUDIT_CONFIG_CHANGE | 1305 | KERN | IND | Audit system configuration change |
AUDIT_SOCKADDR | 1306 | KERN | SC | System call socket address argument information |
AUDIT_CWD | 1307 | KERN | SC | Current working directory |
AUDIT_EXECVE | 1309 | KERN | SC | Arguments supplied to the execve system call |
AUDIT_IPC_SET_PERM | 1311 | KERN | SC | IPC new permissions record type |
AUDIT_MQ_OPEN | 1312 | KERN | SC | POSIX MQ open record type |
AUDIT_MQ_SENDRECV | 1313 | KERN | SC | POSIX MQ send/receive record type |
AUDIT_MQ_NOTIFY | 1314 | KERN | SC | POSIX MQ notify record type |
AUDIT_MQ_GETSETATTR | 1315 | KERN | SC | POSIX MQ get/set attribute record type |
AUDIT_KERNEL_OTHER | 1316 | KERN | IND | For use by 3rd party modules |
AUDIT_FD_PAIR | 1317 | KERN | SC | Information for pipe and socketpair system calls |
AUDIT_OBJ_PID | 1318 | KERN | SC | ptrace target |
AUDIT_TTY | 1319 | KERN | IND | Input on an administrative TTY |
AUDIT_EOE | 1320 | KERN | CTL | End of multi-record event |
AUDIT_BPRM_FCAPS | 1321 | KERN | SC | Information about file system capabilities increasing permissions |
AUDIT_CAPSET | 1322 | KERN | SC | Record showing argument to sys_capset setting process-based capabilities |
AUDIT_MMAP | 1323 | KERN | SC | Mmap system call file descriptor and flags |
AUDIT_NETFILTER_PKT | 1324 | KERN | IND | Packets traversing netfilter chains |
AUDIT_NETFILTER_CFG | 1325 | KERN | IND/SC | Netfilter chain modifications |
AUDIT_SECCOMP | 1326 | KERN | IND | Secure Computing event |
AUDIT_PROCTITLE | 1327 | KERN | SC | Process Title info |
AUDIT_FEATURE_CHANGE | 1328 | KERN | IND | Audit feature changed value |
AUDIT_REPLACE | 1329 | KERN | CTL | Replace auditd if this probe unanswerd |
AUDIT_KERN_MODULE | 1330 | KERN | SC | Kernel Module events |
AUDIT_AVC | 1400 | KERN | SC | SELinux AVC (Access Vector Cache) denial or grant |
AUDIT_SELINUX_ERR | 1401 | KERN | SC | Internal SELinux errors |
AUDIT_AVC_PATH | 1402 | KERN | SC | "dentry, vfsmount pair from AVC" |
AUDIT_MAC_POLICY_LOAD | 1403 | KERN | SC | SELinux Policy file load |
AUDIT_MAC_STATUS | 1404 | KERN | SC | "SELinux mode (enforcing, permissive, off) changed" |
AUDIT_MAC_CONFIG_CHANGE | 1405 | KERN | SC | SELinux Boolean value modification |
AUDIT_MAC_UNLBL_ALLOW | 1406 | KERN | SC | NetLabel: allow unlabeled traffic |
AUDIT_MAC_CIPSOV4_ADD | 1407 | KERN | SC | NetLabel: add CIPSOv4 (Commercial Internet Protocol Security Option) DOI (Domain of Interpretation) entry |
AUDIT_MAC_CIPSOV4_DEL | 1408 | KERN | SC | NetLabel: del CIPSOv4 (Commercial Internet Protocol Security Option) DOI (Domain of Interpretation) entry |
AUDIT_MAC_MAP_ADD | 1409 | KERN | SC | NetLabel: add LSM (Linux Security Module) domain mapping |
AUDIT_MAC_MAP_DEL | 1410 | KERN | SC | NetLabel: del LSM (Linux Security Module) domain mapping |
AUDIT_MAC_IPSEC_ADDSA | 1411 | KERN | DEP | Not used |
AUDIT_MAC_IPSEC_DELSA | 1412 | KERN | DEP | Not used |
AUDIT_MAC_IPSEC_ADDSPD | 1413 | KERN | DEP | Not used |
AUDIT_MAC_IPSEC_DELSPD | 1414 | KERN | DEP | Not used |
AUDIT_MAC_IPSEC_EVENT | 1415 | KERN | SC | Audit an IPsec event |
AUDIT_MAC_UNLBL_STCADD | 1416 | KERN | SC | NetLabel: add a static label |
AUDIT_MAC_UNLBL_STCDEL | 1417 | KERN | SC | NetLabel: del a static label |
AUDIT_MAC_CALIPSO_ADD | 1418 | KERN | SC | NetLabel: add CALIPSO DOI (Domain of Interpretation) entry |
AUDIT_MAC_CALIPSO_DEL | 1419 | KERN | SC | NetLabel: delete CALIPSO DOI (Domain of Interpretation) entry |
AUDIT_AA | 1500 | KERN | ? | |
AUDIT_APPARMOR_AUDIT | 1501 | KERN | SC | |
AUDIT_APPARMOR_ALLOWED | 1502 | KERN | SC | |
AUDIT_APPARMOR_DENIED | 1503 | KERN | SC | |
AUDIT_APPARMOR_HINT | 1504 | KERN | SC | |
AUDIT_APPARMOR_STATUS | 1505 | KERN | SC | |
AUDIT_APPARMOR_ERROR | 1506 | KERN | SC | |
AUDIT_APPARMOR_KILL | enum1507 | KERN | SC | |
AUDIT_ANOM_PROMISCUOUS | 1700 | KERN | SC/IND | Device changed promiscuous mode |
AUDIT_ANOM_ABEND | 1701 | KERN | IND | Process ended abnormally |
AUDIT_ANOM_LINK | 1702 | KERN | SC? | Suspicious use of file links |
AUDIT_INTEGRITY_DATA | 1800 | KERN | SC | Data integrity verification |
AUDIT_INTEGRITY_METADATA | 1801 | KERN | SC | Metadata integrity verification |
AUDIT_INTEGRITY_STATUS | 1802 | KERN | SC | Integrity enable status |
AUDIT_INTEGRITY_HASH | 1803 | KERN | SC | Integrity HASH type |
AUDIT_INTEGRITY_PCR | 1804 | KERN | SC | PCR (Platform Configuration Register) invalidation messages |
AUDIT_INTEGRITY_RULE | 1805 | KERN | SC/IND | Policy rule |
AUDIT_KERNEL | 2000 | KERN | IND | Kernel audit status |
AUDIT_ANOM_LOGIN_FAILURES | 2100 | USER | IND | Failed login limit reached |
AUDIT_ANOM_LOGIN_TIME | 2101 | USER | IND | Login attempted at bad time |
AUDIT_ANOM_LOGIN_SESSIONS | 2102 | USER | IND | Maximum concurrent sessions reached |
AUDIT_ANOM_LOGIN_ACCT | 2103 | USER | IND | Login attempted to watched account |
AUDIT_ANOM_LOGIN_LOCATION | 2104 | USER | IND | Login from forbidden location |
AUDIT_ANOM_MAX_DAC | 2105 | USER | IND | Max DAC (Discretionary Access Control) failures reached |
AUDIT_ANOM_MAX_MAC | 2106 | USER | IND | Max MAC (Mandatory Access Control) failures reached |
AUDIT_ANOM_AMTU_FAIL | 2107 | USER | IND | AMTU (Abstract Machine Test Utility) failure |
AUDIT_ANOM_RBAC_FAIL | 2108 | USER | IND | RBAC (Role-Based Access Control) self test failure |
AUDIT_ANOM_RBAC_INTEGRITY_FAIL | 2109 | USER | IND | RBAC (Role-Based Access Control) file integrity test failure |
AUDIT_ANOM_CRYPTO_FAIL | 2110 | USER | IND | Crypto system test failure |
AUDIT_ANOM_ACCESS_FS | 2111 | USER | IND | Access of file or directory ended abnormally |
AUDIT_ANOM_EXEC | 2112 | USER | IND | Execution of file ended abnormally |
AUDIT_ANOM_MK_EXEC | 2113 | USER | IND | Make an executable |
AUDIT_ANOM_ADD_ACCT | 2114 | USER | IND | Adding a user account ended abnormally |
AUDIT_ANOM_DEL_ACCT | 2115 | USER | IND | Deleting a user account ended abnormally |
AUDIT_ANOM_MOD_ACCT | 2116 | USER | IND | Changing an account ended abnormally |
AUDIT_ANOM_ROOT_TRANS | 2117 | USER | IND | User became root |
AUDIT_RESP_ANOMALY | 2200 | USER | IND | Anomaly not reacted to |
AUDIT_RESP_ALERT | 2201 | USER | IND | Alert email was sent |
AUDIT_RESP_KILL_PROC | 2202 | USER | IND | Kill program |
AUDIT_RESP_TERM_ACCESS | 2203 | USER | IND | Terminate session |
AUDIT_RESP_ACCT_REMOTE | 2204 | USER | IND | User account locked from remote access |
AUDIT_RESP_ACCT_LOCK_TIMED | 2205 | USER | IND | User account locked for time |
AUDIT_RESP_ACCT_UNLOCK_TIMED | 2206 | USER | IND | User account unlocked from time |
AUDIT_RESP_ACCT_LOCK | 2207 | USER | IND | User account was locked |
AUDIT_RESP_TERM_LOCK | 2208 | USER | IND | Terminal was locked |
AUDIT_RESP_SEBOOL | 2209 | USER | IND | Set an SELinux boolean |
AUDIT_RESP_EXEC | 2210 | USER | IND | Execute a script |
AUDIT_RESP_SINGLE | 2211 | USER | IND | Go to single user mode |
AUDIT_RESP_HALT | 2212 | USER | IND | Take the system down |
AUDIT_USER_ROLE_CHANGE | 2300 | USER | IND | User changed to a new SELinux role |
AUDIT_ROLE_ASSIGN | 2301 | USER | IND | Administrator assigned user to SELinux role |
AUDIT_ROLE_REMOVE | 2302 | USER | IND | Administrator removed user from SELinux role |
AUDIT_LABEL_OVERRIDE | 2303 | USER | IND | Administrator is overriding a SELinux label |
AUDIT_LABEL_LEVEL_CHANGE | 2304 | USER | IND | Object level SELinux label modified |
AUDIT_USER_LABELED_EXPORT | 2305 | USER | IND | Object exported with SELinux label |
AUDIT_USER_UNLABELED_EXPORT | 2306 | USER | IND | Object exported without SELinux label |
AUDIT_DEV_ALLOC | 2307 | USER | IND | Device was allocated |
AUDIT_DEV_DEALLOC | 2308 | USER | IND | Device was deallocated |
AUDIT_FS_RELABEL | 2309 | USER | IND | Filesystem relabeled |
AUDIT_USER_MAC_POLICY_LOAD | 2310 | USER | IND | Usersapce daemon loaded SELinux policy |
AUDIT_ROLE_MODIFY | 2311 | USER | IND | Administrator modified an SELinux role |
AUDIT_USER_MAC_CONFIG_CHANGE | 2312 | USER | IND | Change made to MAC (Mandatory Access Control) policy |
AUDIT_CRYPTO_TEST_USER | 2400 | USER | IND | Cryptographic test results |
AUDIT_CRYPTO_PARAM_CHANGE_USER | 2401 | USER | IND | Cryptographic attribute change |
AUDIT_CRYPTO_LOGIN | 2402 | USER | IND | Cryptographic officer login |
AUDIT_CRYPTO_LOGOUT | 2403 | USER | IND | Cryptographic officer logout |
AUDIT_CRYPTO_KEY_USER | 2404 | USER | IND | "Create, delete, negotiate cryptographic key identifier" |
AUDIT_CRYPTO_FAILURE_USER | 2405 | USER | IND | "Fail decrypt, encrypt or randomize operation" |
AUDIT_CRYPTO_REPLAY_USER | 2406 | USER | IND | Cryptographic replay attack detected |
AUDIT_CRYPTO_SESSION | 2407 | USER | IND | Parameters set during TLS session establishment |
AUDIT_CRYPTO_IKE_SA | 2408 | USER | IND | Parameters related to IKE SA |
AUDIT_CRYPTO_IPSEC_SA | 2409 | USER | IND | Parameters related to IPSEC SA |
AUDIT_VIRT_CONTROL | 2500 | USER | IND | "Start, Pause, Stop VM" |
AUDIT_VIRT_RESOURCE | 2501 | USER | IND | Resource assignment |
AUDIT_VIRT_MACHINE_ID | 2502 | USER | IND | Binding of label to VM |
AUDIT_VIRT_INTEGRITY_CHECK | 2503 | USER | IND | Guest integrity results |
AUDIT_VIRT_CREATE | 2504 | USER | IND | Creation of guest image |
AUDIT_VIRT_DESTROY | 2505 | USER | IND | Destruction of guest image |
AUDIT_VIRT_MIGRATE_IN | 2506 | USER | IND | Inbound guest migration info |
AUDIT_VIRT_MIGRATE_OUT | 2507 | USER | IND | Outbound guest migration info |