CS665 Pro 4-13
Machine administrator security functions
4
4.5 Table of items saved in audit log
The purpose of analyzing the audit log is to understand the following and implement countermeasures:
Whether or not data was accessed or tampered with
Subject of attack
Details of attack
Results of attack
For specific analysis methods, see the next page.
Specify unauthorized actions: password authentication
If logs have NG as the result of password authentication (action: 01, 02), items protected by passwords may
have been attacked.
- Failed password authentication (NG) log entries specify who made the operation, and show if
unauthorized actions were made when password authentication failed.
- Even if password authentication succeeded (OK), it shows whether a legitimate user created the action.
You need to check carefully when successful authentication occurs after series of failures especially
during times other than normal operating hours.
Specify unauthorized actions: actions other than password authentication under security
All operation results other than password authentication will be indicated as successful (OK), so determine if
there were any unauthorized actions by ID and action.
- Check the time, and see if the user who operated the specific subject made any unauthorized actions.
Actions to take if unauthorized operations are found
If it's found that a password has been leaked after analyzing the audit log, change the password immediately.
No. Operation ID Stored
action
Result
1 CE authentication CE ID 01 OK/NG
2 Manager authentication Machine Administrator ID 02 OK/NG
3 Set/change Security Strengthen mode Machine Administrator ID 03 OK
4 Print audit log Machine Administrator ID 04 OK
5 Change/register CE password CE ID 05 OK
6 Change/register Machine Administrator
password
CE ID/ Machine Administrator ID06 OK
13 Change HDD lock password Machine Administrator ID 19 OK