Chat now with support
Chat with Support

InTrust 11.3.2 - InTrust Reports

Forensic Analysis

All Solaris Audit Log events

Solaris Audit Log events
Solaris Syslog Events

This InTrust form helps you perform detailed analysis of security events in your Solaris environment.REQUIREMENT InTrust 9.6

Normal User Activity

Logins

Failed logins

This InTrust report shows statistics on failed logins by all users. Click a number in the report to view details of the logins.

Successful logins

This InTrust report shows statistics on successful logins by all users. Click a number in the report to view details of the logins.

File access

This InTrust report shows details of file access attempts. Failed Click a Details link to view a sub-report with details of the relevant event.

Process execution

This InTrust report shows process execution data based on the exec() and execve() system calls.

su command usage

This InTrust report helps track the use of the su command. For each host, it shows the following information: date and time the command was used, audit user and real user who issued the command, and the corresponding Solaris Audit log message.

User sessions

This InTrust report shows details of user sessions, from login to logout, and lets you discover particular users activity patterns.

 

Report Pack for SQL Server

This section contains a list of reports included in the InTrust11.3.2 Report Pack for SQL Server.

C2 Log

Account Management

Logins audit

This InTrust report shows events from the C2 log which indicate that a SQL Server login is added or removed, a Windows login is added or removed, or a property of a login, including passwords, is modified. For each SQL server name and instance, the report displays the following event details login name, date and time, action type and action status.

Roles audit

This InTrust report shows events from the C2 log which indicate that a login has been added or removed as a database user. For each SQL server name and instance, the report displays the following event details database name, login name, role name, action date and time, action type and action status.

Users audit

This InTrust report shows events from the C2 log which indicate that a login is added or removed as a database user (with Windows or SQL Server authentication). For each SQL server and instance, the report displays the following details: database name, user name, login name, action date and time, action type and action status.

Change Management

Database structure modifications

This InTrust report shows events from the C2 log which indicate that a CREATE, ALTER, or DROP object command has been executed. For each SQL server and instance, the report displays the following event details: database name, object name, user name, date and time, action type and action status.

Permission modifications

This InTrust report shows events from the C2 log which indicate that a GRANT, DENY or REVOKE has been executed for a statement permission or for an object permission. For each SQL server and instance, the report displays the following event details database name, object or statement name, user name, date and time, action type and action status.

Logons

Logons c2 log

This InTrust report shows user logon events from the C2 log. For each SQL server and instance, the report displays the following event details: Server and instance, Date/Time, login, event class, host and application name.

All events in c2 log

This InTrust report shows all SQL Server events gathered from the C2 log. For each SQL server and instance, the report displays such event details as Server, Instance, Date/Time, Login, Event Class, Database, Success.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating