Ordinarily, enable audits
rather than alarms for security-related events because the audit records
are written to the system security audit log where you can study them
in volume and archive log files for future reference. While an isolated
auditing message may offer little insight, numerous audit records
produce a pattern of security violations. For example, with auditing
of object access, you can see a pattern of time, types of objects
being accessed, and other system information that, in total, paint
a picture of how the system is being used at different times of day.
To enable audits for unsuccessful access to files,
devices, and volumes, enter the following command:
$SET AUDIT/AUDIT/ENABLE=ACCESS=FAILURE/CLASS=(FILE,DEVICE,VOLUME)
|
This command records unsuccessful access events
in the security audit log file but sends no alarms to the operator
terminal.