Displays all events for a specific process. | |
> | Writes output to specified file. |
It can take a few minutes to prepare the record for viewing when working with large audit logs. When viewing your audit data, be aware of the following anomalies:
•Audit data can appear inaccurate when programs that call auditable system calls supply incorrect parameters. The audit data shows what the user program passed to the kernel. For example, calling the kill system call with no parameters produces unpredictable values in the parameter section of the audit record.
•System calls that take file name arguments may not have device and inode information properly recorded. The values will be zero if the call does not complete successfully.
•Auditing the superuser while changing the event or system call parameters will result in a long audit record. For example, when you add an event type to be audited, a record will be produced for each event type and system call that has been enabled for audit, not just for the new event type being added.
Examples of Using the audisp Command
The following examples show audit information displayed using the audisp command:
•Display the log output on the screen:
#/usr/sbin/audisp audit_file
•Direct the log output to /tmp/mylogoutput:
#/usr/sbin/audisp audit_file > /tmp/mylogoutput
•View successful events only:
#/usr/sbin/audisp
•View activities owned by user joe:
#/usr/sbin/audisp
•View activities on terminal, ttypa:
#/usr/sbin/audisp
•View login events only:
#/usr/sbin/audisp
Auditing 81