Examples of user-selectable attributes for snapshot and audit options
Attribute name |
Description |
---|---|
Account Disabled |
Compare the status of user accounts. |
ACL Owner |
Compare the owner of a file or registry key. |
Auditing ACL |
Compare access control entries in the System Access Control List (SACL) for a file or registry key. SACL entries are used to audit actions so they are recorded in a security log. Each access control entry specifies what circumstances trigger an audit, identifies a group or user to monitor, and lists operations to audit. |
Checksum |
Calculate a unique key (an MD5 checksum) based on all the data in a file and use that key to compare entire files and detect changes that occur anywhere in a file. Computing full checksums requires significant processing. |
Code Page |
Compare users' language of choice. |
Contents |
Compare file content when performing an audit based on a snapshot of file content. |
Effective Setting as String Value |
Compare the effective value of security settings. |
Full Name |
Compare users' full names. |
Group members |
Compare the groups belonging to a Local Group. |
Group owner |
Compare a file's group ID. |
Home Directory Drive |
Compare the home directories of user accounts. |
Home Path |
Compare the home paths of user accounts. |
Inherit Auditing ACL |
Compare whether an object inherits access control entries in the System Access Control List (SACL) from its parent object. |
Inherit Permission ACL |
Compare whether an object inherits access control entries in the Discretionary Access Control List (DACL) from its parent object. |
Light Checksum |
Calculate a unique key based on the first 512 bytes of a file (a light MD5 checksum) and then use the light checksum to compare header information in files without expending the processing necessary for calculating full checksums. Light checksums are useful for binary files; they are not recommended for text files. |
Local Setting as String Value |
Compare the value of security settings defined for each server. |
Login Script |
Compare the login script for user accounts. |
Logon Server |
Compare users' logon server. |
Max Size |
Compare the maximum size of event logs. |
Member of |
Compare the groups to which users belong. |
Permission ACL |
Compare access control entries in the Discretionary Access Control List (DACL) for a file or registry key. Each DACL access control entry specifies whether access is granted, identifies a group or user granted or denied access, and lists actions permitted or denied. |
Permissions |
Compare the permissions assigned to files. |
Privilege Level |
Compare the privilege level for user accounts. |
Profile Path |
Compare user profile paths. |
Retention |
Compare the amount of time event logs are kept. |
Size |
Compare the sizes of files. |
User Expire Date |
Compare the dates when user accounts expire. |
User members |
Compare the users belonging to a Local Group. |
User owner |
Compare a file's user ID. |
Version |
Compare file version information for DLL, EXE, and other types of files. |
Comments
Log in or register to comment.