The following events are triggered by commands or system calls that require
privileges and are usually executed only by administrators.
Privileged events
The events represented here are triggered by commands or system
calls that administrators use in the normal course of daily
operations.
These events require privilege, and therefore should only be
executed by administrators. In particular, frequent or unusual
appearances of the
pm_denied
event, which indicates a failed operation due to lack of required
privilege, could indicate an attempt to subvert system security.
MAC administration events are triggered by commands used
to control and display information about
security levels attached to devices.
These commands are used in the administration of devices and filesystems,
so such events are not listed in
``Mandatory access control (MAC) events''.
In general, only the administrators of a system can execute commands that
trigger MAC administration events.
Administrators are trusted users; therefore,
the presence of these events in the log file does not usually indicate security
problems.
Unprivileged use of commands that generate these events
may indicate an attempt to tamper with the
system configuration, a serious breach of security.
NOTE:
MAC events are recorded only in log files generated
on systems running UNIX System V Release 4.1 Enhanced Security, or
UNIX System V Release 4.2MP, with the Enhanced Security Utilities
installed. Unless you are processing a log file from a system
running one of these releases, you will not see these events.