All of the following events provide valuable information about the users on your system. The bad_auth event records all attempts to login that fail because of an invalid password or logname. A high number of such failures may indicate that someone who does not know a valid logname or password is trying to log in. It is especially important to audit this event if you have dial-up terminal ports on your system. If you choose to audit the bad_auth, event, it must be set in the system-wide event mask, not in a specific user event mask. The event records failed login attempts, and a user event mask takes effect only once a user has successfully logged on.
User authentication events
| Event | Description | Manual page | Object audit |
|---|---|---|---|
| bad_auth | bad logname/password | login(1) | N |
| bad_lvl | bad login level | login(1) | N |
| cron | cron job | cron(1M) | N |
| def_lvl | change a user's default level | login(1) | N |
| login | use a login schema | login(1) | N |
| logoff | terminate a login session | NA | N |
| passwd | change password | passwd(1) | N |