Suggested Events and Actions to Log

Log Entry Classes lists several security-relevant items that can be logged by the system. The list is organized by major and minor types.

On systems where security is an important concern, log at least all the items listed in Log Entry Classes, with one exception: If the minor types under major type 14 are logged, it is not necessary to log the minor types under major type 3.

Table 45. Log Entry Classes

Major Type

Minor Type

Item Logged

1

JOB RECORD

1

Beginning-of-job (BOJ) record

2

End-of-job (EOJ) record

3

Beginning-of-task (BOT) record

4

End-of-task (EOT) record

5

File-open record

6

File-close record

9

Usercode validation (LOGVALIDATE)

15

Library link

16

Library delink

19

Database open

20

Database close

25

File statistics record

30

Database Security Error

35

Database Access

2

MAINTENANCE RECORD

17

Hardware Configuration

18

Software Configuration

3

STRING RECORD

1

RSVP message

4

SYSTEM message

7

DISPLAY message

9

UNIT RSVP message

10

Special RSVP message

4

MCS RECORD

1

Session log-on record

2

Session log-off record

4

MCS message record

6

MCS security violation entry

7

MCS station application

10

Direct window open/close

13

Session log-on with authentication data

6

MISCELLANEOUS RECORD

1

Halt/load record

3

SETSTATUS record

4

Security violation

7

Controller command

8

Print subsystem command

9

USERDATA change

11

New USERDATA install

12

Primitive command

14

MLS MESSAGE ENTRY

1

RSVP message entry

4

INFO message entry

7

DISPLAY message entry

9

Unit RSVP message entry

10

Special RSVP message entry

16

FILE STATUS RECORD

2

File creation

3

File removal

4

File title change

5

File security attribute

17

DATA COMM CONFIGURATION RECORD

1

Data comm IDC change

3

New data comm install

18

COMS CONFIGURATION RECORD

11

Usercode change

13

Load file

20

SYSTEM SECURITY RECORD

1

Key Management

2

Security Center Error

3

Key Manager Library

4

Client Access Services

27

TCP/IP RECORD

11

Security

15

SSL

20

IPsec

24

SSH

38

SSH

1

Inbound Connection Open

2

Inbound Connection Close

3

Inbound Channel Open

4

Inbound Channel Request

5

Inbound Channel Close

11

Outbound Connection Open

12

Outbound Connection Close

13

Outbound Channel Open

14

Outbound Channel Request

15

Outbound Channel Close

40

MULTI-FACTOR AUTHENTICATION RECORD

1

Authentication


Notes:
  • Log entries can be written to the SUMLOG or security log file (which record activity for all jobs), the job log file (which records the activity of an individual job), both places, or none of these logs. Default logging actions are established by the MCP and can be changed by the user.

  • Use the LOGGING command to display or change the destinations of particular log entry types. Refer to the System Commands Reference for details and options.

  • Refer to the System Log Programming Reference Manual for information on log entry types and to see the default action for each logging type and subtype.