Event Details
User Activity->Privilege Use->Privilege Sessions (TPAM)->Session: Expired early
Session: Expired early
 Sample:
Feb 18 17:35:54 10.30.44.209 PAR[3688]: UserName: dimawin Operation: Expired early ObjectType: Session Target: dimalinux/yksm Role: Requestor Failed? 0
Log Type: Generic Syslog
 Uniquely Identified By:
OS Type: Any
Filtering RegExp: ^(.{15}) ([-[:alnum:]_.]+) ([^():]+)(\([^[]+\)){0,1}(\[[0-9]+\]){0,1}: (UserName: (.*) Operation: (.*) ObjectType: (.*) Target: (.*) Role: (.*[^])[]* Failed\? (.*))
Field Matching
FieldDescriptionStored inSample Value
When At what date and time a user activity originated in the system. DateTime Feb 18 17:35:54
Who Account or user name under which the activity occured. UserName dimawin
What The type of activity occurred (e.g. Logon, Password Changed, etc.) "Session expired early." Session expired early.
Where The name of the workstation/server where the activity was logged. Computer 10.30.44.209
Where From The name of the workstation/server where the activity was initiated from. -
Severity Specify the seriousness of the event. -
WhoDomain -
WhereDomain -
UserName TPAM user account initiating event. - dimawin
Operation Type of action - Expired early
ObjectType Type of the object on which action is taken. - Session
Target Name of the object on which action is taken. - dimalinux/yksm
Role Permission type - Requestor
Failed Result of execution (0 - true, 1 - false) - 0
Comments
You must be logged in to comment