Topics on this page
The Integrity Monitoring module scans for unexpected changes to directories, registry values, registry keys, services, processes, installed software, ports, groups, users, files, and the WQL query statement on Deep Security Agents. To enable and configure Integrity Monitoring, see Set up integrity monitoring.
The UserSet element represents a set of users. On a Windows system it operates on users local to the system - the same users displayed by the "Local Users and Groups" MMC snap-in. Note that these are local users only if the Deep Security Agent is running on something other than a domain controller. On a domain controller, a UserSet element will enumerate all of the domain users, which may not be advisable for extremely large domains.
On Unix systems, the users monitored are whatever the "getpwent_r()" and "getspnam_r()" APIs have been configured to return. On AIX systems specifically, the users monitored are those listed in the
These are XML attributes of the tag itself, as opposed to the attributes of the Entity monitored by Integrity Monitoring Rules.
|Attribute||Description||Required||Default Value||Allowed Values|
|onChange||Will be monitored in real time||No||false||true, false|
Entity Set Attributes
These are the attributes of the entity that can be monitored:
- cannotChangePassword: True or false indicating if the user is permitted to change their password.
- disabled: True or false indicating if the account has been disabled. On Windows systems this reflects the "disabled" check box for the user. On Unix systems this will be true if the user's account has expired or if their password has expired and they've exceeded the inactivity grace period for changing it.
- fullName: The display name of the user.
- groups: A comma-separated list of the groups to which the user belongs.
- homeFolder: The path to the home folder or directory.
- lockedOut: True or false indicating if the user has been locked out, either explicitly or due to excessive failed password attempts.
- passwordHasExpired: True or false indicating if the user's password has expired. Note that on Windows this attribute is only available on Windows XP and newer operating systems.
- passwordLastChanged: The timestamp of the last time the user's password was changed. This is recorded by the Deep Security Agent as the number of milliseconds since Jan 1 1970 UTC. Workload Security renders the timestamp in local time based on this value. Note that on Unix platforms, the resolution of this attribute is one day, so the time component of the rendered timestamp is meaningless. (Not supported by AIX.)
- passwordNeverExpires: True or false indicating if the password does not expire.
- user: The name of the user as known to the operating system. For example, "Administrator" or "root".
- description: The primary group the user belongs to.
- homeDriveLetter: The drive letter to which a network share is mapped as the user's home folder.
- logonScript: The path to a script that executes every time the user logs in.
- profilePath: A network path if roaming or mandatory Windows user profiles are being used.
Linux, AIX, and Solaris Attributes
- group: The primary group the user belongs to.
- logonShell: The path to the shell process for the user.
- passwordExpiredDaysBeforeDisabled: The number of days after the user's password expires that the account is disabled. On Solaris, this attribute refers to the number of inactive days before the user is disabled. (Not supported by AIX.)
- passwordExpiry: The date on which the user's account expires and is disabled.
- passwordExpiryInDays: The number of days after which the user's password must be changed.
- passwordMinDaysBetweenChanges: The minimum number of days permitted between password changes.
- passwordWarningDays: The number of days before the user's password is to expire that user is warned.
Short Hand Attributes
- logonScript (Windows-only)
- profilePath (Windows-only)
- group (Linux-only)
- logonShell (Linux-only)
- passwordExpiryInDays (Linux-only)
- passwordMinDaysBetweenChanges (Linux-only)
Meaning of "Key"
The key is the username. This is not a hierarchical EntitySet. Patterns are applied only to the user name. As a result the "**" pattern is not applicable.
The following example monitors for any user creations or deletions. (Note that attributes are explicitly excluded so group membership would not be tracked):
<UserSet> <Attributes/> <include key="*" /> </UserSet>
The following example would track the creation and deletion of the "jsmith" account, along with any changes to the STANDARD attributes of the account (since the STANDARD set for this EntitySet is automatically included if no specific attribute list is included):
<UserSet> <include key="jsmith" /> </UserSet>
Include and Exclude
See Integrity monitoring rules language for a general description of include for their allowed attributes and sub elements.
Special attributes of Include and Exclude for UserSets
Various other attributes of the user may be used in include and exclude feature tests. These tests compare a value against the value of an attribute of the user; take note of the platform support for various attributes - not all attributes are available across platforms or even platform revisions, hence the use of these tests in include and exclude elements is of limited use. The feature tests support Unix glob-style wildcarding with * and ?, and there is no normalization of path separators or other characters - it is a simple match against the value of the attribute.
- Disabled: Does true or false match the disabled attribute of the user. The following example monitors users with a primary group of either "users" or "daemon":
<UserSet> <include disabled="true"/> </UserSet>
- Group: Does a wildcard match against the primary group of the user. This test is only applicable on Unix systems. The following example would monitor users with a primary group of either "users" or "daemon".
<UserSet> <include group="users"/> <include group="daemon"/> </UserSet>
- LockedOut: Does a true or false match against the lockedOut attribute of the user.
- PasswordHasExpired: Does a true or false match against the passwordHasExpired attribute of the user.
- PasswordNeverExpires: Does a true or false match against the passwordNeverExpires attribute of the user.