Browse Prior Art Database

Userid Activity Log Procedure

IP.com Disclosure Number: IPCOM000015446D
Original Publication Date: 2002-Apr-25
Included in the Prior Art Database: 2003-Jun-20
Document File: 2 page(s) / 89K

Publishing Venue

IBM

Abstract

At least one privileged userid is set on each computer system in order to do basic tasks: to administer, to install products or to solve critical situations, etc. The log of the activity performed by these userids can be very useful. Let us see, for example, Audit Trackings performed by security teams. On one hand they must now if an especific user was used or not, on the other hand the type of activity he has done. System and Security administrators spend a lot of time in the whole process and much more if we are talking about a descentralized environment with multiple systems and platforms (to retrieve previous information, to perform a correct audit and to take the appropiate corrective actions).

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 74% of the total text.

Page 1 of 2

Userid Activity Log Procedure

     At least one privileged userid is set on each computer system in order to do basic tasks: to administer, to install products or to solve critical situations, etc. The log of the activity performed by these userids can be very useful. Let us see, for example, Audit Trackings performed by security teams. On one hand they must now if an especific user was used or not, on the other hand the type of activity he has done. System and Security administrators spend a lot of time in the whole process and much more if we are talking about a descentralized environment with multiple systems and platforms (to retrieve previous information, to perform a correct audit and to take the appropiate corrective actions).

   The Activity Log Procedure avoid some tasks by gettig an activity commad log in real time process, by showing an initial message at the beginning of a session ( e.g.: business notice etc.) and storing the user command activity in a log file and sending this information to a single aplication and userid.

The following flow chart shows the Activity Log Logic:

1

Page 2 of 2

USERID LOGON U SER ID LO G O N

ITEX EX IT

CALL

Show W elcom e M e ssa g e

     Display C om m and Prom pt

 Command reco gn ised b y Op. System?

ontinue?C C ontinue?

Show W elcom e M essage

   1st tim e function called?

  Command recognised by Op. System?

Do W HILE U serid is L o g ge d on an d W H IL E
is w orkin g
(D O N E = N O )

Do W HILE userid is entering C om m ands

NO

NO

    1st ti...