Event Details
User Activity->Privilege Use->Privilege Sessions (TPAM)->Session Request: Add
Session Request: Add
 Sample:
Feb 12 15:03:23 10.30.44.209 PAR[540]: UserName: dimawin Operation: Add ObjectType: Session Request Target: dimalinux/yk65 Role: Requestor Failed? 1
Log Type: Generic Syslog
 Uniquely Identified By:
OS Type: Any
Filtering RegExp: ^(.{15}) ([-[:alnum:]_.]+) ([^():]+)(\([^[]+\)){0,1}(\[[0-9]+\]){0,1}: (UserName: (.*) Operation: (.*) ObjectType: (.*) Target: (.*) Role: (.*[^])[]* Failed\? (.*))
Field Matching
FieldDescriptionStored inSample Value
When At what date and time a user activity originated in the system. DateTime Feb 12 15:03:23
Who Account or user name under which the activity occured. UserName dimawin
What The type of activity occurred (e.g. Logon, Password Changed, etc.) "Session Request was added." Session Request was added.
Where The name of the workstation/server where the activity was logged. Computer 10.30.44.209
Where From The name of the workstation/server where the activity was initiated from. -
Severity Specify the seriousness of the event. -
WhoDomain -
WhereDomain -
UserName TPAM user account initiating event. - dimawin
Operation Type of action - Add
ObjectType Type of the object on which action is taken. - Session Request
Target Name of the object on which action is taken. - dimalinux/yksm
Role Permission type - Requestor
Failed Result of execution (0 - true, 1 - false) - 1
Comments
You must be logged in to comment