Privileges and Auditing
Privilege use can be audited. When a process uses a privilege, the
use of privilege is recorded in the audit trail. The privileges are recorded
in their textual representation. The following audit events record use of privilege:
AUE_SETPPRIV audit event – The event generates an audit record when a privilege set is changed. The AUE_SETPPRIV audit event is in the pm class.
AUE_MODALLOCPRIV audit event – The audit event generates an audit record when a privilege is added from outside the kernel. The AUE_MODALLOCPRIV audit event is in the ad class.
AUE_MODDEVPLCY audit event – The audit event generates an audit record when the device policy is changed. The AUE_MODDEVPLCY audit event is in the ad class.
AUE_prof_cmd audit event – The audit event generates an audit record when a command is executed in a profile shell. The AUE_prof_cmd audit event is in the as and ua audit classes.
The successful use of privileges that are in the basic set is
not audited. The attempt to use a basic privilege that has been removed
from a user's basic set is audited.