+

Search Tips   |   Advanced Search

Configure security auditing using scripting

Security auditing provides tracking and archiving of auditable events. This topic uses the wsadmin tool to enable and administer our security auditing configurations.

While security authentication and authorization ensures that users must have access to view protected resources, security auditing provides a mechanism to validate the integrity of a security computing environment. Security auditing collects and logs authentication, authorization, system management, security, and audit policy events in audit event records. We can analyze audit event records to determine possible security breaches, threats, attacks, and potential weaknesses in the security configuration of the environment. Enable security auditing in the environment. For example, the following list displays a sample of events to audit:

Use the following task outline to enable and configure security auditing in the environment:


Tasks

  1. Enable administrative security in the environment.
  2. Configure auditable events.
  3. Configure audit event factories.
  4. Configure audit service providers.
  5. Set the global audit policy.

After completing the steps to enable and configure security auditing, the profile of interest audits the security configurations for specific auditable event types.


What to do next

To further configure security auditing, we can:


Subtopics

  • Enable and disable security using scripting