|
||
|
IBM i Security - QAUDJRN Entry TypesFor your convenience, I have compiled a list of all of the journal entry types used in QAUDJRN auditing, along with a short description of each type. For example, the journal entry type AF indicates an Authority Failure (when a user tries to access a file without sufficient authority). Included in this reference, you will find the journal code type T entries that make up the bulk of entries in QAUDJRN. While other journal code types are found in the journal, they are not typically related to security. For example, type J entries indicate journal and journal receiver operations, and type U entries are used for custom-generated entries or those of a third party software vendor. This information is also available in the IBM i Security Reference 6.1, Appendix F. You can download the pdf file here. QAUDJRN Journal Entry Types for Journal Code TEntry type Description AD Auditing changes AF Authority failure AP Obtaining adopted authority AU Attribute changes CA Authority changes CD Command string audit CO Create object CP User profile changed, created, or restored CQ Change of *CRQD object CU Cluster Operations CV Connection verification CY Cryptographic Configuration DI Directory Server DO Delete object DS DST security password reset EV System environment variables GR Generic record GS Socket description was given to another job IM Intrusion monitor IP Interprocess Communication IR IP Rules Actions IS Internet security management JD Change to user parameter of a job description JS Actions that affect jobs KF Key ring file LD Link, unlink, or look up directory entry ML Office services mail actions NA Network attribute changed ND APPN directory search filter violation NE APPN end point filter violation OM Object move or rename OR Object restore OW Object ownership changed O1 (Optical Access) Single File or Directory O2 (Optical Access) Dual File or Directory O3 (Optical Access) Volume PA Program changed to adopt authority PG Change of an object’s primary group PO Printed output PS Profile swap PW Invalid password RA Authority change during restore RJ Restoring job description with user profile specified RO Change of object owner during restore RP Restoring adopted authority program RQ Restoring a *CRQD object RU Restoring user profile authority RZ Changing a primary group during restore SD Changes to system distribution directory SE Subsystem routing entry changed SF Actions to spooled files SG Asynchronous Signals SK Secure sockets connections SM Systems management changes SO Server security user information actions ST Use of service tools SV System value changed VA Changing an access control list VC Starting or ending a connection VF Closing server files VL Account limit exceeded VN Logging on and off the network VO Validation list actions VP Network password error VR Network resource access VS Starting or ending a server session VU Changing a network profile VV Changing service status X0 Network Authentication X1 Identify Token XD Directory server extension YC DLO object accessed (change) YR DLO object accessed (read) ZC Object accessed (change) ZR Object accessed (read) About the Author Dan Riehl is the Editor of the SecureMyi Security Newsletter and President and Security Specialist for the IT Security and Compliance Group, LLC. Dan performs IBM i security assessments and provides customized security
services. He also provides training in all aspects of IBM i security and other technical areas through the training
company,The 400 School, Inc.
|
|