RHEL Audit System Reference

Updated

Audit Event Fields

The following table lists all currently-supported Audit event fields. An event field is the value preceding the equal sign in the Audit log files.

Event FieldExplanationRHEL 7RHEL 8
a0, a1, a2, a3Records the first four arguments of the system call, encoded in hexadecimal notation.yesyes
acctRecord the user account name under which the process was executed.yesyes
actionRecords the action taking place in an integrity policy rule.yesyes
appraise_typeRecords the appraisal type used in an integrity policy rule.yesyes
addrRecords the IPv4 or IPv6 address. This field usually follows a hostname field and contains the address the host name resolves to.yesyes
archRecords information about the CPU architecture of the system, encoded in hexadecimal notation.yesyes
auidRecords the Audit user ID. This ID is assigned to a user upon login and is inherited by every process even when the user's identity changes (for example, by switching user accounts with su -john).yesyes
calipso_doiRecords the DOI of an RFC5570 Calipso entry.noyes
calipso_typeRecords the type of an RFC5570 Calipso entry.noyes
capabilityRecords the number of bits that were used to set a particular Linux capability. For more information on Linux capabilities, see the capabilities(7) man page.yesyes
cap_feRecords data related to the setting of the effective file system-based capability bit.yesyes
cap_fiRecords data related to the setting of an inherited file system-based capability.yesyes
cap_fpRecords data related to the setting of a permitted file system-based capability.yesyes
cap_fverRecords the version of a file system-based capability.yesyes
cap_peRecords data related to the setting of an effective process-based capability.yesyes
cap_piRecords data related to the setting of an inherited process-based capability.yesyes
cap_ppRecords data related to the setting of a permitted process-based capability.yesyes
causeRecords the cause in an integrity policy rule.yesyes
cgroupRecords the path to the cgroup that contains the process at the time the Audit event was generated.yesyes
cmdRecords the entire command line that is executed. This is useful in case of shell interpreters where the exe field records, for example, /bin/bash as the shell interpreter and the cmd field records the rest of the command line that is executed, for example helloworld.sh --help.yesyes
codeRecords the seccomp action.yesyes
commRecords the command that is executed. This is useful in case of shell interpreters where the exe field records, for example, /bin/bash as the shell interpreter and the comm field records the name of the script that is executed, for example helloworld.sh.yesyes
compatRecords the syscall compatibility mode in a seccomp action.yesyes
cwdRecords the path to the directory in which a system call was invoked.yesyes
dataRecords data associated with TTY records.yesyes
devRecords the minor and major ID of the device that contains the file or directory recorded in an event.yesyes
devmajorRecords the major device ID.yesyes
devminorRecords the minor device ID.yesyes
egidRecords the effective group ID of the user who started the analyzed process.yesyes
euidRecords the effective user ID of the user who started the analyzed process.yesyes
exeRecords the path to the executable that was used to invoke the analyzed process.yesyes
exitRecords the exit code returned by a system call. This value varies by system call. You can interpret the value to its human-readable equivalent with the following command: ausearch --interpret --exit exit_codeyesyes
familyRecords the type of address protocol that was used, either IPv4 or IPv6.yesyes
featureRecords the audit feature being set or cleared.yesyes
fileRecords the file involved in an integrity measurement.yesyes
filetypeRecords the type of the file.yesyes
flagsRecords the file system name flags.yesyes
fownerRecords the file owner used in an integrity policy rule.yesyes
fsgidRecords the file system group ID of the user who started the analyzed process.yesyes
fsmagicRecords the filesystem magic used in an integrity policy rule.yesyes
fsuuidRecords the fsuuid used in an integrity policy rule.yesyes
fsuidRecords the file system user ID of the user who started the analyzed process.yesyes
funcRecords the function involved in an integrity policy rule.yesyes
gidRecords the group ID.yesyes
hashRecords the hash of a file involved in an integrity measurement.yesyes
hostnameRecords the host name.yesyes
icmptypeRecords the type of a Internet Control Message Protocol (ICMP) package that is received. Audit messages containing this field are usually generated by iptables.yesyes
idRecords the user ID of an account that was changed.yesyes
inodeRecords the inode number associated with the file or directory recorded in an Audit event.yesyes
inode_gidRecords the group ID of the inode's owner.yesyes
inode_uidRecords the user ID of the inode's owner.yesyes
ipRecords the instruction pointer in a seccomp action.yesyes
itemsRecords the number of path records that are attached to this record.yesyes
keyRecords the user defined string associated with a rule that generated a particular event in the Audit log.yesyes
listRecords the Audit rule list ID. The following is a list of known IDs: 0 — user, 1 — task, 4 — exit, 5 — excludeyesyes
modeRecords the file or directory permissions, encoded in numerical notation.yesyes
msgRecords a time stamp and a unique ID of a record, or various event-specific = pairs provided by the kernel or user space applications.yesyes
msgtypeRecords the message type that is returned in case of a user-based AVC denial. The message type is determined by D-Bus.yesyes
nameRecords the full path of the file or directory that was passed to the system call as an argument.yesyes
new-diskRecords the name of a new disk resource that is assigned to a virtual machine.yesyes
new-memRecords the amount of a new memory resource that is assigned to a virtual machine.yesyes
new-vcpuRecords the number of a new virtual CPU resource that is assigned to a virtual machine.yesyes
new-netRecords the MAC address of a new network interface resource that is assigned to a virtual machine.yesyes
new_gidRecords a group ID that is assigned to a user.yesyes
new_lockRecords the new value of a lock being set on an audit feature.yesyes
nsecRecords the number of nanoseconds by which the system clock was shifted.noyes
oauidRecords the user ID of the user that has logged in to access the system (as opposed to, for example, using su) and has started the target process. This field is exclusive to the record of type OBJ_PID.yesyes
ocommRecords the command that was used to start the target process.This field is exclusive to the record of type OBJ_PID.yesyes
old_lockRecords the old value of a lock being set on an audit feature.yesyes
opidRecords the process ID of the target process. This field is exclusive to the record of type OBJ_PID.yesyes
osesRecords the session ID of the target process. This field is exclusive to the record of type OBJ_PID.yesyes
ouidRecords the real user ID of the target processyesyes
objRecords the SELinux context of an object. An object can be a file, a directory, a socket, or anything that is receiving the action of a subject.yesyes
objtypeRecords the intent of the PATH record object in the context of a syscall.yesyes
obj_gidRecords the group ID of an object.yesyes
obj_lev_highRecords the high SELinux level of an object.yesyes
obj_lev_lowRecords the low SELinux level of an object.yesyes
obj_roleRecords the SELinux role of an object.yesyes
obj_typeRecords the type of an object.yesyes
obj_uidRecords the UID of an objectyesyes
obj_userRecords the user that is associated with an object.yesyes
ogidRecords the object owner's group ID.yesyes
old-diskRecords the name of an old disk resource when a new disk resource is assigned to a virtual machine.yesyes
old-memRecords the amount of an old memory resource when a new amount of memory is assigned to a virtual machine.yesyes
old-vcpuRecords the number of an old virtual CPU resource when a new virtual CPU is assigned to a virtual machine.yesyes
old-netRecords the MAC address of an old network interface resource when a new network interface is assigned to a virtual machine.yesyes
old_promRecords the previous value of the network promiscuity flag.yesyes
ouidRecords the real user ID of the user who started the target process.yesyes
pathRecords the full path of the file or directory that was passed to the system call as an argument in case of AVC-related Audit eventsyesyes
permRecords the file permission that was used to generate an event (that is, read, write, execute, or attribute change)yesyes
pidThe pid field semantics depend on the origin of the value in this field. In fields generated from user-space, this field holds a process ID. In fields generated by the kernel, this field holds a thread ID. The thread ID is equal to process ID for single-threaded processes. Note that the value of this thread ID is different from the values of pthread_t IDs used in user-space. For more information, see the gettid(2) man page.yesyes
ppidRecords the Parent Process ID (PID).yesyes
proctitleRecords the full command-line of the command that was used to invoke the analyzed process. The field is encoded in hexadecimal notation to not allow the user to influence the Audit log parser. The text decodes to the command that triggered this Audit event. When searching Audit records with the ausearch command, use the -i or --interpret option to automatically convert hexadecimal values into their human-readable equivalents.yesyes
promRecords the network promiscuity flag.yesyes
protoRecords the networking protocol that was used. This field is specific to Audit events generated by iptables.yesyes
resRecords the result of the operation that triggered the Audit event.yesyes
respRecords the response from an fanotify access control decision.yesyes
resultRecords the result of the operation that triggered the Audit event.yesyes
saddrRecords the socket address.yesyes
sauidRecords the sender Audit login user ID. This ID is provided by D-Bus as the kernel is unable to see which user is sending the original auid.yesyes
secRecords the number of seconds by which the system clock was shifted.noyes
sesRecords the session ID of the session from which the analyzed process was invoked.yesyes
sgidRecords the set group ID of the user who started the analyzed process.yesyes
sigRecords the number of a signal that causes a program to end abnormally. Usually, this is a sign of a system intrusion.yesyes
subjRecords the SELinux context of a subject. A subject can be a process, a user, or anything that is acting upon an object.yesyes
subj_clrRecords the SELinux clearance of a subject.yesyes
subj_roleRecords the SELinux role of a subject.yesyes
subj_senRecords the SELinux sensitivity of a subject.yesyes
subj_typeRecords the type of a subject.yesyes
subj_userRecords the user that is associated with a subject.yesyes
successRecords whether a system call was successful or failed.yesyes
suidRecords the set user ID of the user who started the analyzed process.yesyes
syscallRecords the type of the system call that was sent to the kernel.yesyes
terminalRecords the terminal name (without /dev/).yesyes
ttyRecords the name of the controlling terminal. The value (none) is used if the process has no controlling terminal.yesyes
uidRecords the real user ID of the user who started the analyzed process.yesyes
vmRecords the name of a virtual machine from which the Audit event originated.yesyes
xattrRecords the set of extended attributes modified and protected by EVM.noyes

Audit Record Types

The following table lists all currently-supported types of Audit records. The event type is specified in the type= field at the beginning of every Audit record.

Event TypeExplanationRHEL 7RHEL 8
ACCT_LOCKTriggered when a user-space user account is locked by the administrator.yesyes
ACCT_UNLOCKTriggered when a user-space user account is unlocked by the administrator.yesyes
ADD_GROUPTriggered when a user-space group is added.yesyes
ADD_USERTriggered when a user-space user account is added.yesyes
ANOM_ABEND1Triggered when a processes ends abnormally (with a signal that could cause a core dump, if enabled).yesyes
ANOM_ACCESS_FS1Triggered when a file or a directory access ends abnormally.yesyes
ANOM_ADD_ACCT1Triggered when a user-space account addition ends abnormally.yesyes
ANOM_AMTU_FAIL1Triggered when a failure of the Abstract Machine Test Utility (AMTU) is detected.yesyes
ANOM_CRYPTO_FAIL1Triggered when a failure in the cryptographic system is detected.yesyes
ANOM_DEL_ACCT1Triggered when a user-space account deletion ends abnormally.yesyes
ANOM_EXEC1Triggered when an execution of a file ends abnormally.yesyes
ANOM_LINK1Triggered when suspicious use of file links is detected.yesyes
ANOM_LOGIN_ACCT1Triggered when an account login attempt ends abnormally.yesyes
ANOM_LOGIN_FAILURES1Triggered when the limit of failed login attempts is reached.yesyes
ANOM_LOGIN_LOCATION1Triggered when a login attempt is made from a forbidden location.yesyes
ANOM_LOGIN_SESSIONS1Triggered when a login attempt reaches the maximum amount of concurrent sessions.yesyes
ANOM_LOGIN_TIME1Triggered when a login attempt is made at a time when it is prevented by, for example, pam_time.yesyes
ANOM_MAX_DAC1Triggered when the maximum amount of Discretionary Access Control (DAC) failures is reached.yesyes
ANOM_MAX_MAC1Triggered when the maximum amount of Mandatory Access Control (MAC) failures is reached.yesyes
ANOM_MK_EXEC1Triggered when a file is made executable.yesyes
ANOM_MOD_ACCT1Triggered when a user-space account modification ends abnormally.yesyes
ANOM_PROMISCUOUS1Triggered when a device enables or disables promiscuous mode.yesyes
ANOM_RBAC_FAIL1Triggered when a Role-Based Access Control (RBAC) self-test failure is detected.yesyes
ANOM_RBAC_INTEGRITY_FAIL1Triggered when a Role-Based Access Control (RBAC) file integrity test failure is detected.yesyes
ANOM_ROOT_TRANS1Triggered when a user becomes root.yesyes
AVCTriggered to record an SELinux permission check.yesyes
AVC_PATHTriggered to record the dentry and vfsmount pair when an SELinux permission check occurs.yesyes
BPRM_FCAPSTriggered when a user executes a program with a file system capability.yesyes
CAPSETTriggered to record the capabilities being set for process-based capabilities, for example, running as root to drop capabilities.yesyes
CHGRP_IDTriggered when a user-space group ID is changed.yesyes
CHUSER_IDTriggered when a user-space user ID is changed.yesyes
CONFIG_CHANGETriggered when the Audit system configuration is modified.yesyes
CRED_ACQTriggered when a user acquires user-space credentials.yesyes
CRED_DISPTriggered when a user disposes of user-space credentials.yesyes
CRED_REFRTriggered when a user refreshes their user-space credentials.yesyes
CRYPTO_FAILURE_USERTriggered when a decrypt, encrypt, or randomize cryptographic operation fails.yesyes
CRYPTO_IKE_SATriggered when an Internet Key Exchange Security Association is established.yesyes
CRYPTO_IPSEC_SATriggered when an Internet Protocol Security Association is established.yesyes
CRYPTO_KEY_USERTriggered to record the cryptographic key identifier used for cryptographic purposes.yesyes
CRYPTO_LOGINTriggered when a cryptographic officer login attempt is detected.yesyes
CRYPTO_LOGOUTTriggered when a cryptographic officer logout attempt is detected.yesyes
CRYPTO_PARAM_CHANGE_USERTriggered when a change in a cryptographic parameter is detected.yesyes
CRYPTO_REPLAY_USERTriggered when a replay attack is detected.yesyes
CRYPTO_SESSIONTriggered to record parameters set during a TLS session establishment.yesyes
CRYPTO_TEST_USERTriggered to record cryptographic test results as required by the FIPS-140 standard.yesyes
CWDTriggered to record the current working directory.yesyes
DAC_CHECKTriggered to record DAC check results.yesyes
DAEMON_ABORTTriggered when a daemon is stopped due to an error.yesyes
DAEMON_ACCEPTTriggered when the auditd daemon accepts a remote connection.yesyes
DAEMON_CLOSETriggered when the auditd daemon closes a remote connection.yesyes
DAEMON_CONFIGTriggered when a daemon configuration change is detected.yesyes
DAEMON_ENDTriggered when a daemon is successfully stopped.yesyes
DAEMON_ERRTriggered when an auditd daemon internal error is detected.yesyes
DAEMON_RESUMETriggered when the auditd daemon resumes logging.yesyes
DAEMON_ROTATETriggered when the auditd daemon rotates the Audit log files.yesyes
DAEMON_STARTTriggered when the auditd daemon is started.yesyes
DEL_GROUPTriggered when a user-space group is deletedyesyes
DEL_USERTriggered when a user-space user is deletedyesyes
DEV_ALLOCTriggered when a device is allocated.yesyes
DEV_DEALLOCTriggered when a device is deallocated.yesyes
EOETriggered to record the end of a multi-record event.yesyes
EXECVETriggered to record arguments of the execve(2) system call.yesyes
FANOTIFYTriggered when an fanotify access decision is made.yesyes
FD_PAIRTriggered to record the use of the pipe and socketpair system calls.yesyes
FEATURE_CHANGETriggered when an Audit feature changed value.yesyes
FS_RELABELTriggered when a file system relabel operation is detected.yesyes
GRP_AUTHTriggered when a group password is used to authenticate against a user-space group.yesyes
GRP_CHAUTHTOKTriggered when a group account password or PIN is modified.yesyes
GRP_MGMTTriggered to record user-space group account attribute modification.yesyes
INTEGRITY_DATA2Triggered to record a data integrity verification event run by the kernel.yesyes
INTEGRITY_EVM_XATTR2Triggered when an EVM-covered extended attribute is modified.noyes
INTEGRITY_HASH2Triggered to record a hash type integrity verification event run by the kernel.yesyes
INTEGRITY_METADATA2Triggered to record a metadata integrity verification event run by the kernel.yesyes
INTEGRITY_PCR2Triggered to record Platform Configuration Register (PCR) invalidation messages.yesyes
INTEGRITY_RULE2Triggered to record a policy rule.yesyes
INTEGRITY_STATUS2Triggered to record the status of integrity verification.yesyes
IPCTriggered to record information about a Inter-Process Communication object referenced by a system call.yesyes
IPC_SET_PERMTriggered to record information about new values set by an IPC_SET control operation on an IPC object.yesyes
KERN_MODULETriggered to record a kernel module name on load or unload.yesyes
KERNELTriggered to record the initialization of the Audit system.yesyes
KERNEL_OTHERTriggered to record information from third-party kernel modules.yesyes
LABEL_LEVEL_CHANGETriggered when an object's level label is modified.yesyes
LABEL_OVERRIDETriggered when an administrator overrides an object's level label.yesyes
LOGINTriggered to record relevant login information when a user log in to access the system.yesyes
MAC_CALIPSO_ADDTriggered when a NetLabel CALIPSO DOI entry is added.noyes
MAC_CALIPSO_DELTriggered when a NetLabel CALIPSO DOI entry is deleted.noyes
MAC_CHECKTriggered when a user space MAC (Mandatory Access Control) decision is made.yesyes
MAC_CIPSOV4_ADDTriggered when a Commercial Internet Protocol Security Option (CIPSO) user adds a new Domain of Interpretation (DOI). Adding DOIs is a part of the packet labeling capabilities of the kernel provided by NetLabel.yesyes
MAC_CIPSOV4_DELTriggered when a CIPSO user deletes an existing DOI. Adding DOIs is a part of the packet labeling capabilities of the kernel provided by NetLabel.yesyes
MAC_CONFIG_CHANGETriggered when an SELinux Boolean value is changed.yesyes
MAC_IPSEC_EVENTTriggered to record information about an IPSec event, when one is detected, or when the IPSec configuration changes.yesyes
MAC_MAP_ADDTriggered when a new Linux Security Module (LSM) domain mapping is added. LSM domain mapping is a part of the packet labeling capabilities of the kernel provided by NetLabel.yesyes
MAC_MAP_DELTriggered when an existing LSM domain mapping is deleted. LSM domain mapping is a part of the packet labeling capabilities of the kernel provided by NetLabel.yesyes
MAC_POLICY_LOADTriggered when a SELinux policy file is loaded.yesyes
MAC_STATUSTriggered when the SELinux mode (enforcing, permissive, off) is changed.yesyes
MAC_UNLBL_ALLOWTriggered when unlabeled traffic is allowed when using the packet labeling capabilities of the kernel provided by NetLabel.yesyes
MAC_UNLBL_STCADDTriggered when a static label is added when using the packet labeling capabilities of the kernel provided by NetLabel.yesyes
MAC_UNLBL_STCDELTriggered when a static label is deleted when using the packet labeling capabilities of the kernel provided by NetLabel.yesyes
MMAPTriggered to record a file descriptor and flags of the mmap(2) system call.yesyes
MQ_GETSETATTRTriggered to record the mq_getattr(3) and mq_setattr(3) message queue attributes.yesyes
MQ_NOTIFYTriggered to record arguments of the mq_notify(3) system call.yesyes
MQ_OPENTriggered to record arguments of the mq_open(3) system call.yesyes
MQ_SENDRECVTriggered to record arguments of the mq_send(3) and mq_receive(3) system calls.yesyes
NETFILTER_CFGTriggered when Netfilter chain modifications are detected.yesyes
NETFILTER_PKTTriggered to record packets traversing Netfilter chains.yesyes
OBJ_PIDTriggered to record information about a process to which a signal is sent.yesyes
PATHTriggered to record file name path information.yesyes
PROCTITLEGives the full command-line that triggered this Audit event, triggered by a system call to the kernel.yesyes
RESP_ACCT_LOCK3Triggered when a user account is locked.yesyes
RESP_ACCT_LOCK_TIMED3Triggered when a user account is locked for a specified period of time.yesyes
RESP_ACCT_REMOTE3Triggered when a user account is locked from a remote session.yesyes
RESP_ACCT_UNLOCK_TIMED3Triggered when a user account is unlocked after a configured period of time.yesyes
RESP_ALERT3Triggered when an alert email is sent.yesyes
RESP_ANOMALY3Triggered when an anomaly was not acted upon.yesyes
RESP_EXEC3Triggered when an intrusion detection program responds to a threat originating from the execution of a program.yesyes
RESP_HALT3Triggered when the system is shut down.yesyes
RESP_KILL_PROC3Triggered when a process is terminated.yesyes
RESP_SEBOOL3Triggered when an SELinux Boolean value is set.yesyes
RESP_SINGLE3Triggered when the system is put into single-user mode.yesyes
RESP_TERM_ACCESS3Triggered when a session is terminated.yesyes
RESP_TERM_LOCK3Triggered when a terminal is locked.yesyes
ROLE_ASSIGNTriggered when an administrator assigns a user to an SELinux role.yesyes
ROLE_MODIFYTriggered when an administrator modifies an SELinux role.yesyes
ROLE_REMOVETriggered when an administrator removes a user from an SELinux role.yesyes
SECCOMPTriggered when a SECure COMPuting event is detected.yesyes
SELINUX_ERRTriggered when an internal SELinux error is detected.yesyes
SERVICE_STARTTriggered when a service is started.yesyes
SERVICE_STOPTriggered when a service is stopped.yesyes
SOCKADDRTriggered to record a socket address.yesyes
SOCKETCALLTriggered to record arguments of the sys_socketcall system call (used to multiplex many socket-related system calls).yesyes
SOFTWARE_UPDATETriggered to record software update events.yesyes
SYSCALLTriggered to record a system call to the kernel.yesyes
SYSTEM_BOOTTriggered when the system is booted up.yesyes
SYSTEM_RUNLEVELTriggered when the system's run level is changed.yesyes
SYSTEM_SHUTDOWNTriggered when the system is shut down.yesyes
TESTTriggered to record the success value of a test message.yesyes
TIME_ADJNTPVALTriggered when the system clock is modified.noyes
TIME_INJOFFSETTriggered when a Timekeeping offset is injected to the sytem clock.noyes
TRUSTED_APPThe record of this type can be used by third party application that require auditing.yesyes
TTYTriggered when TTY input was sent to an administrative process.yesyes
USER_ACCTTriggered when a user-space user authorization attempt is detected.yesyes
USER_AUTHTriggered when a user-space user authentication attempt is detected.yesyes
USER_AVCTriggered when a user-space AVC message is generated.yesyes
USER_CHAUTHTOKTriggered when a user account password or PIN is modified.yesyes
USER_CMDTriggered when a user-space shell command is executed.yesyes
USER_DEVICETriggered when a user-space hotplug device is changed.yesyes
USER_ENDTriggered when a user-space session is terminated.yesyes
USER_ERRTriggered when a user account state error is detected.yesyes
USER_LABELED_EXPORTTriggered when an object is exported with an SELinux label.yesyes
USER_LOGINTriggered when a user logs in.yesyes
USER_LOGOUTTriggered when a user logs out.yesyes
USER_MAC_POLICY_LOADTriggered when a user-space daemon loads an SELinux policy.yesyes
USER_MGMTTriggered to record user-space user account attribute modification.yesyes
USER_ROLE_CHANGETriggered when a user's SELinux role is changed.yesyes
USER_SELINUX_ERRTriggered when a user-space SELinux error is detected.yesyes
USER_STARTTriggered when a user-space session is started.yesyes
USER_TTYTriggered when an explanatory message about TTY input to an administrative process is sent from user-space.yesyes
USER_UNLABELED_EXPORTTriggered when an object is exported without SELinux label.yesyes
USYS_CONFIGTriggered when a user-space system configuration change is detected.yesyes
VIRT_CONTROLTriggered when a virtual machine is started, paused, or stopped.yesyes
VIRT_MACHINE_IDTriggered to record the binding of a label to a virtual machine.yesyes
VIRT_RESOURCETriggered to record resource assignment of a virtual machine.yesyes
1

All Audit event types prepended with ANOM are intended to be processed by an intrusion detection program.
2: This event type is related to the Integrity Measurement Architecture (IMA), which functions best with a Trusted Platform Module (TPM) chip.
3: All Audit event types prepended with RESP are intended responses of an intrusion detection system in case it detects malicious activity on the system.

Additional Resources

  • auditd(8) man page
  • ausearch(8) man page
  • auditd.conf(5) man page
Category
Components
Article Type