HP XP P9000 Audit Log User and Reference Guide

Table Of Contents
Contents
1 Introduction.............................................................................................12
Resources that can be executed for each function........................................................................12
Overview..............................................................................................................................12
Features............................................................................................................................13
Audit Log file description.........................................................................................................13
Audit log file format................................................................................................................14
Log output formats for different versions.....................................................................................18
Syslog file format....................................................................................................................19
2 Using audit logs.......................................................................................23
Downloading audit log files.....................................................................................................23
Downloading syslog files.........................................................................................................24
Transferring audit log files to FTP servers....................................................................................24
Transferring audit log files to syslog servers................................................................................25
Storing audit logs...................................................................................................................27
3 Quick reference........................................................................................28
Audit Log Functions.................................................................................................................28
Remote Web Console and SVP operation..................................................................................29
Command sent from the host....................................................................................................40
Encryption Key operation.........................................................................................................40
Single Sign-on operation.........................................................................................................40
Audit log reproduced output....................................................................................................41
Audit log lost output ...............................................................................................................41
4 Audit log examples...................................................................................42
Audit Log descriptions.............................................................................................................42
[AuditLog] Audit Log buffer..................................................................................................42
[AuditLog] Create File.........................................................................................................42
[AuditLog] DKCAuditLog was lost.........................................................................................42
[AuditLog] Over MaxLine....................................................................................................42
[AuditLog] Over Threshold...................................................................................................43
[AuditLog] Set FTP Server....................................................................................................43
[AuditLog] Set Syslog Server................................................................................................44
[AuditLog] SIM Complete....................................................................................................45
ACM descriptions...................................................................................................................45
[ACM] Add Users..............................................................................................................45
[ACM] Assign Resource Groups...........................................................................................45
[ACM] Assign Roles...........................................................................................................46
[ACM] Change Password....................................................................................................46
[ACM] Create User............................................................................................................47
[ACM] Create User Group..................................................................................................47
[ACM] Delete User Groups..................................................................................................48
[ACM] Delete Users............................................................................................................48
[ACM] Edit User................................................................................................................49
[ACM] Edit User Group......................................................................................................49
[ACM] Remove Users..........................................................................................................49
[ACM] Set Login Message...................................................................................................50
[ACM] Set up Server..........................................................................................................50
BASE descriptions...................................................................................................................54
[BASE] Certificate Update...................................................................................................54
[BASE] Control Panel Backup...............................................................................................54
[BASE] Control Panel Restore...............................................................................................55
Contents 3