CIFS Administration 7-27
(YHQW/RJ'HWDLO'LVSOD\V

+RZWR([DPLQHDQ(YHQWLQ'HWDLO

You examine an event in detail by double-clicking it and looking at the resulting event
details display. There are the following kinds of event details displays:
Windows file access detail displays
UNIX file access detail displays
Unsuccessful file access detail display
Lost record event detail display

:LQGRZV)LOH$FFHVV'HWDLO'LVSOD\V

Windows file access detail displays show the following information displayed in the
detail screens as shown in Table 7-6
.

7DEOH:LQGRZV)LOH$FFHVV'HWDLO'LVSOD\V

)LHOG 'HVFULSWLRQ
Object Server The name of the subsystem server process calling
the audit check function. This is always SECURITY,
because this is a security log.
Object Type The type of object being accessed.
Object name The name (such as a file name) of the object being
accessed.
New Handle ID The new handle identifier of the open object.
Operation ID A unique identifier associating multiple events result-
ing from a single operation.
Process ID The identifier of the client process accessing the
object.
Primary User Name The user name of the user requesting the object
access. When impersonation is taking place, this is
the user name with which the server process is
logged on.
Primary Domain The name of the computer, or SYSTEM if the user
identified by Primary User Name is SYSTEM. If the
computer is a member of a Windows NT Server
domain, this can also be the name of the domain
containing the primary users account.
Primary Logon ID A unique identifier assigned when the primar y user
logged on.