1.\" Copyright (c) 2004 Apple Inc. 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. Neither the name of Apple Inc. ("Apple") nor the names of 13.\" its contributors may be used to endorse or promote products derived 14.\" from this software without specific prior written permission. 15.\" 16.\" THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND 17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19.\" ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR 20.\" ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 24.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 25.\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26.\" POSSIBILITY OF SUCH DAMAGE. 27.\" 28.Dd January 24, 2004 29.Dt AUDIT_EVENT 5 30.Os 31.Sh NAME 32.Nm audit_event 33.Nd "audit event descriptions" 34.Sh DESCRIPTION 35The 36.Nm 37file contains descriptions of the auditable events on the system. 38Each line maps an audit event number to a name, a description, and a class. 39Entries are of the form: 40.Pp 41.Sm off 42.D1 Ar eventnum : eventname : description : eventclass 43.Sm on 44.Pp 45Each 46.Ar eventclass 47should have a corresponding entry in the 48.Xr audit_class 5 49file. 50.Pp 51Example entries in this file are: 52.Bd -literal -offset indent 530:AUE_NULL:indir system call:no 541:AUE_EXIT:exit(2):pc 552:AUE_FORK:fork(2):pc 563:AUE_OPEN:open(2):fa 57.Ed 58.Sh FILES 59.Bl -tag -width ".Pa /etc/security/audit_event" -compact 60.It Pa /etc/security/audit_event 61.El 62.Sh SEE ALSO 63.Xr audit 4 , 64.Xr audit_class 5 , 65.Xr audit_control 5 , 66.Xr audit_user 5 67.Sh HISTORY 68The OpenBSM implementation was created by McAfee Research, the security 69division of McAfee Inc., under contract to Apple Computer Inc.\& in 2004. 70It was subsequently adopted by the TrustedBSD Project as the foundation for 71the OpenBSM distribution. 72.Sh AUTHORS 73.An -nosplit 74This software was created by McAfee Research, the security research division 75of McAfee, Inc., under contract to Apple Computer Inc. 76Additional authors include 77.An Wayne Salamon , 78.An Robert Watson , 79and SPARTA Inc. 80.Pp 81The Basic Security Module (BSM) interface to audit records and audit event 82stream format were defined by Sun Microsystems. 83