- 1 minute to read
- Print
- DarkLight
- PDF
Audited command logs
- 1 minute to read
- Print
- DarkLight
- PDF
The Audited Command Logs section of User Behavior presents detailed records of all audited commands executed by users within senhasegura. These logs capture critical information about each audited command, allowing for complete traceability of actions taken.
In the context of senhasegura, audited command logs are a feature that records individual occurrences of events or incidents registered in the system that indicate situations requiring attention or action.
The occurrence system allows the information security team to effectively monitor and respond to these events, ensuring proactive and robust organizational security management.
Types of occurrences
For a more detailed understanding, occurrences in senhasegura are categorized into different reports, allowing for an in-depth analysis of recorded events. These types include:
Occurrences by command: a report that displays all audited commands executed by users, their criticality, and the number of sessions in which they were executed.
Occurrences by device: a report that displays all audited commands executed on specific devices and the number of sessions in which they were executed.
Occurrences by credential: a report that displays all audited commands executed by specific credentials, the actions during the session, the target device, and the number of sessions in which they were executed.
Occurrences by user: a report that displays all audited commands executed by a user, the action taken during the session, the target device, the credential used, and the number of sessions in which they were executed.
Sessions with occurrences detected: a report that identifies user sessions where events requiring attention occurred, allowing for a quick response to security incidents.
Conclusion
Through the detailed and categorized analysis of the types of occurrences, including occurrences by command, device, credential, and user, security teams can act more quickly and assertively. Additionally, the detailing of sessions with detected occurrences allows for a concise and targeted analysis of specific events, increasing effectiveness in preventing security breaches and protecting critical data.