Appendix A: Raz-Lee Entry Types

In addition to the (Undefined variable: Audit.ProductName) Types provided by IBM, iSecurity (Undefined variable: Audit.ProductName)provides you with additional (Undefined variable: Audit.ProductName)Types to allow you to be more granular in the choice of events you choose to audit.

Raz-Lee Entry Types beginning with "$"

Raz-Lee has defined its own iSecurity-specific “status” entry types in order to provide our customers with even more auditing possibilities than those provided by native IBM OS400 facilities. These entry types are named $A, $B.

As opposed to OS400 entry type records which are written to QAUDJRN as a result of actions which took place in the system, Raz-Lee’s “in-house” audit types provide current status information regarding jobs, objects, libraries, commands, user profiles, authorities, system values, network definitions, etc.

Raz-Lee Entry Types @J, @K, @P, @S

In the area of “system control”, Raz-Lee has added additional entry types @J, @K, @P and @S which monitor system status- high CPU usage, use of disk space, database and system faults and more- as well as active and non-active jobs and pool information.

These entry types can be set and managed via STRAUD> 13.

Raz-Lee Entry Types @0…@9

Also in the area of “system control”, STRAUD > 14 enables controlling, using Option 1, and defining, using Option 11, messages queues named @0 thru @9. These include the special QHST message queue, accessed by command DSPLOG, which is always associated with message queue @9.

Summary of Raz-Lee Entry Types

Raz-Lee has added additional entry types as follows:

  • $@- History Log
  • A$- All types of QAUDJRN containing Library and Object
  • A#- All types of QAUDJRN
  • C@- User Profile Changed (After and Previous Images)

The table below provides a list of Entry Types:

Audit Type

Entry Type

Sub Type

Description

*Status

$@

A

QHST History log.

*Status

$0

A

Displays Audit statistics from file AUSTTSP

*Status

$1

A

Displays Firewall statistics from file GSSTTSP

*Status

$9

A

Intercept any number of spool files that are created by execution of a command or a program. The spool files are assembled into free format text that is handled by the report generator. Using this $9 type the full range of the report generator capabilities are opened for use, including HTML, PDF output. Running on multiple systems, sending by Email and more.

*Status

$A

A

Displays the *BASIC content of a user profile. All parameters as defined in the user profile are displayed

*Status

$B

A

Displays the *OBJOWN objects owned by the user. Object names, object types, and the libraries in which the objects reside. Also indicates if the object is an authority holder.

*Status

$C

A

Displays the *OBJPGP total number of objects this user owns, the object names, the object types, and the libraries in which the objects reside. Also indicates if the object is an authority holder.

*Status

$D

A

Displays the *OBJAUT names of the objects (except those authorized for public use) to which the user has specific authority, the user's authority for those objects, and the object types.

*Status

$E

A

Displays Job schedule entries.

*Status

$G

A

Displays the *GRPMBR members of a group. This display is available only if the displayed user profile is a group profile.

*Status

$H

A

File members description – This type provides reporting of large file members, file members that require reorganization, obtain source members names that were used to create the objects, and more. $H can be run if 1=Fast mode (takes minutes for the entire system), or 2=Standard mode (takes much more). Choose according to your OS level and the type of information you require, as the Standard mode includes more fields.

*Status

$I

A

Displays object descriptions

*Status

$J

A

Displays the *OBJAUT names of the objects (except those authorized for public use) to which the user has specific authority, the user's authority for those objects, and the object types.

*Status

$K

A

Displays Job Descriptions with Excess Authority (JOBD with associated user profile, that *PUBLIC can use).

*Status

$L

A

Displays Library descriptions

*Status

$M

A

Displays the activation schedule of user profiles

*Status

$N

A

Displays the expiration schedule of user profiles

*Status

$P

A

Displays the number of users who have default passwords. The report does not display User names for security reasons.

If there are too many users with default passwords, a user with the appropriate security permissions should run the ANZDFTPWD command to check the actual users and take the necessary action to correct the situation.

*Status

$S

A

Displays the SYSVAL names and values of the system values

*Status

$T

A

Displays the DSPNETA the network attributes of the system.

*Status

$U

A

Authorization Lists

*Status

$V

A

Native objects secured by authorization list

*Status

$W

A

IFS objects secured by authorization list

*Status

$X

A

Library information, including size and % of disk space. The execution of a report of this type requires a pre-run of the standard Retrieve Disk Information (RTVDSKINF) Command. Information is then taken from this run.

ENTRY TYPE PROD TEXT
$@ AU History Log
$A AU User profile information
$A UP User profile information
$B AU Objects that are owned by a user
$C AU Objects that a user is their primary group
$D AU Objects for which a user has specific authority
$E AU Job schedule entries
$F AU Command attributes
$G AU Group profile and their users
$G UP Group profile and their users
$H AU File members
$I AU Object description
$J AU Object authority
$K AU Job descriptions with user profile & *PUBLIC=*USE
$L AU Libraries description
$M AU User profile activation schedule
$M UP User profile activation schedule
$N AU User profile expiration schedule
$N UP User profile expiration schedule
$O AU Program/Service-Program information
$P AU Users with default password (Repair by ANZDFTPWD)
$P UP Users with default password (Repair by ANZDFTPWD)
$Q AU Programs that adopt authorities
$R AU IFS Objects
$S AU System values
$T AU Network attributes
$U AU Authorization Lists
$V AU Native objects secured by authorization list
$W AU IFS objects secured by authorization list
$X AU Library information [run RTVDSKINF first]
$Y AU Modules of Program/Service-Program
$0 AU Audit Statistics processing
$1 AU Firewall Statistics processing
$3 AU Compliance report
$8 AU Query log report
$9 AU Interface to any spool file query
$9 FD Interface to any spool file query
$9 OD Interface to any spool file query
#A AU System limits trending
#A KP System limits trending
#C AU PTF Groups Installed vs. Available
#C CT PTF Groups Installed vs. Available
#C KP PTF Groups Installed vs. Available
#G AU Group PTF Info
#G CT Group PTF Info
#G KP Group PTF Info
#H AU PTF Info
#H CT PTF Info
#H KP PTF Info
#K AU Netstat information
#K KP Netstat information
#L AU NETSTAT interface information
#L KP NETSTAT interface information
#M AU NETSTAT routing information
#M KP NETSTAT routing information
#N AU NetStat job info
#N KP NetStat job info
#Q AU TCP/IP information
#Q KP TCP/IP information
#R AU Current server information
#R KP Current server information
#U AU System status
#U KP System status
#V AU System memory pool information
#V KP System memory pool information
#W AU AU Active jobs
#X AU Disk status
#X KP Disk status
#Y AU Output queue information (summary)
#Y KP Output queue information (summary)
#Z AU License Information
@J AU Active job information
@K AU Job not active
@P AU Pool not active
@S AU System status and pool information
@0 AU Message queue (Group Id 0)
@1 AU Message queue (Group Id 1)
@2 AU Message queue (Group Id 2)
@3 AU Message queue (Group Id 3)
@4 AU Message queue (Group Id 4)
@5 AU Message queue (Group Id 5)
@6 AU Message queue (Group Id 6)
@7 AU Message queue (Group Id 7)
@8 AU Message queue (Group Id 8)
@9 AU QHST messages
A$ AU All types of QAUDJRN containing Library & Object
A# AU All types of QAUDJRN
AD AU Auditing changes
AF AU Authority failure
AP AU Obtaining adopted authority
AU AU Attribute change
AX AU Row and Column Access Control (RCAC)
C@ AU User profile changed (After & Previous images)
C@ UP User profile changed (After & Previous images)
CA AU Authority changes
CD AU Command string audit
CD OD Command string audit
CO AU Create object
CP AU User profile changed, created, or restored
CP UP User profile changed, created, or restored
CQ AU Change of *CRQD object
CU AU Cluster operations
CV AU Connection verification
CY AU Cryptographic configuration
D@ CM Command checked
DI AU Directory services
DO AU Delete object
DS AU DST security password reset
EV AU System environment variables
GR AU Generic record
GS AU Socket description was given to another job
IM AU Intrusion monitor
IP AU Interprocess communication
IR AU IP rules actions
IS AU Internet security management
JD AU Change to user parameter of a job description
JS AU Actions that affect jobs
KF AU Key ring file
LD AU Link, unlink, or look up directory entry
ML AU Office services mail actions
NA AU Network attribute changed
ND AU APPN directory search filter violation
NE AU APPN end point filter violation
OM AU Object move or rename
OR AU Object restore
OW AU Object ownership changed
O1 AU Optical access: Single file or directory
O2 AU Optical access: Dual file or directory
O3 AU Optical access: Volume
P@ PR Password Reset
PA AU Program changed to adopt authority
PF AU PTF Operations
PG AU Change of an object's primary group
PO AU Printed output
PS AU Profile swap
PU AU PTF Object Change
PW AU Invalid password
RA AU Authority change during restore
RJ AU Restoring job description with profile specific
RO AU Change of object owner during restore
RP AU Restoring adopted authority program
RQ AU Restoring a *CRQD object
RU AU Restoring user profile authority
RZ AU Changing a primary group during restore
SD AU Changes to system distribution directory
SE AU Subsystem routing entry changed
SF AU Actions to spooled files
SG AU Asynchronous Signals
SK AU Secure sockets connections
SM AU System management changes
SO AU Server security user information actions
ST AU Use of service tools
SV AU System value changed
VA AU Changing an access control list (rel 4.5-7.1)
VC AU Starting or ending a connection (rel 4.5-7.1)
VF AU Closing server files (rel 4.5-7.1)
VL AU Account limit exceeded (rel 4.5-7.1)
VN AU Logging on and off the network (rel 4.5-7.1)
VO AU Validation list actions
VP AU Network password error
VR AU Network resource access (rel 4.5-7.1)
VS AU Starting/ending a server session (rel 4.5-7.1)
VU AU Changing a network profile (rel 4.5-7.1)
VV AU Changing service status (rel 4.5-7.1)
XD AU Directory server extension
X0 AU Network Authentication
X1 AU Identity token
X2 AU Query Manager profile values.
YC AU DLO object accessed (change)
YR AU DLO object accessed (read)
ZC AU Object accessed (change)
ZM AU SOM method access (no longer used by IBM)
ZR AU Object accessed (read)
0 FW Generic entry type (00-99 for reporting only)
1 FW *FILTFR Original File Transfer Function
2 FW *FTPLOG FTP Server Logon
3 FW *FTPSRV FTP Server-Incoming Rqst Validation
4 FW *SQL Database Server - SQL access
5 FW *RMTSRV Remote Command/Program Call
6 FW *FILSRV File Server
7 FW *DDM DDM request access
8 FW *TELNET Telnet Device Initialization
9 FW *TFTP TFTP Server Request Validation
1K FD *FW-DFN Native Object Security
1L FD *FW-DFN IFS object security
1M FD *FW-DFN Command Exceptions
1N FD *FW-DFN Users & Groups
1Y AU iSecurity groups members
10 FW *REXLOG REXEC Server Logon
11 FW *REXEC REXEC Server Request Validation
12 FW *RMTSQL Original Remote SQL Server
13 FW *NDB Database Server - data base access
14 FW *WSG WSG Server Sign-On Validation
15 FW *ORDTAQ Original Data Queue Server
16 FW *DTAQ Data Queue Server
17 FW *MSGSRV Original Message Server
18 FW *SQLENT Database Server - entry
19 FW *OBJINF Database Server - object information
20 FW *VPRT Original Virtual Print Server
21 FW *NPRENT Network Print Server - entry
22 FW *NPRSPL Network Print Server - spool file
23 FW *CHGUP Change User Profile
24 FW *CRTUP Create User Profile
25 FW *DLTUPA Delete User Profile - after delete
26 FW *DLTUPB Delete User Profile
27 FW *RSTUP Restore User Profile
28 FW *ORLICM Original License Mgmt Server
29 FW *CSLICM Central Server - license mgmt
30 FW *CSCNVM Central Server - conversion map
31 FW *CSCLNM Central Server - client mgmt
32 FW *TCPSGN TCP Signon Server
33 FW *PWRDWN Prepower Down System
34 FW *RMTSGN Remote sign-on (Passthrough)
35 FW *PWDVLD Password Dictionary Check / Validation
36 FW *DRDA DRDA Distributed Relational DB access
37 FW *FTPCLN FTP Client-Outgoing Rqst Validation
38 FW *TELOFF Telnet Device Termination
39 FW *DHCPAB DHCP Address Binding Notify
40 FW *DHCPAR DHCP Address Release Notify
41 FW *DHCPRP DHCP Request Packet Validation
42 FW *SIGNON Sign-On completed
43 FW *PWDCHK Password Dictionary Check / Check
44 FW *SSHD SSH Daemon
45 FW *DBOPEN Open Database
46 FW *PWDVL2 Password Dictionary Check /Validation fmt2
47 FW Socket Accept
48 FW Socket Connect
49 FW Socket Listen
5A CT Tracking Data (Native/IFS/PTF/Source)
5B CT ILE Modules Inventory
5D CT Definition of IFS Directories
5F CT PTF Status
5G CT PTF Advanced status (Rel 7.2)
5I CT Definition of Activity to Disregard
5J CT Definition of Environments
5L CT Definition of Libraries to Trace
5M CT Definition of Projects
5N CT Definition of Tasks
5R CT Definition of IFS Directories to Disregard
5W CT Tracking Data (Native Objects)
5X CT Tracking Data (Source Members)
5Y CT Tracking Data (IFS Objects)
5Z CT Tracking Data (PTF Objects)
6A JR Object Journaling Plan
6B JR Object check Journaling Plan
6C JR Confirmation tickets
6I OD AOD History
6V AV Virus, Worm, Trojan, Ransomware detected
6X PR Person - Attributes
6Y PR Users of a Person
6Z PR Log of who changed questions
7E AC User Compliance Check
7F AC User Compliance Plan
7I AC Native Object Compliance Check
7J AC Native Object Compliance Plan
7M AC IFS Object Compliance Check
7N AC IFS Object Compliance Plan
97 FW *SCRLCK Screen locked due to timeout
98 FW *SCRRLS Screen released
99 FW *SCREND Screen jobs ended as timeout passed