Skip to main content

UX_CriticalFiles Job

The UX_CriticalFiles job provides visibility into owners of critical files within audited Unix and Linux environments such as passwd, shadow, sudoers, hosts.deny, and more.

Queries for the UX_CriticalFiles Job

The UX_CriticalFIles job uses the Unix Data Collector for the following query:

warning

The query is preconfigured for this job. Never modify the query.

Queries for the UX_CriticalFiles Job

The query for the UX_CriticalFiles job is:

  • Critical File Owners – Finds critical file ownership

Analysis Tasks for the UX_CriticalFiles Job

Navigate to the Unix > 2.Privileged Access > UX_CriticalFiles > Configure node and select Analysis to view the analysis tasks.

warning

Do not modify or deselect the selected analysis tasks. The analysis tasks are preconfigured for this job.

Analysis Tasks for the UX_CriticalFiles Job

The default analysis task is:

  • Details critical file ownership, highlights top users

    • Creates SA_UX_PrivilegedAccess_CriticalFileOwnership table accessible under the job’s Results node
    • Creates SA_UX_PrivilegedAccess_CriticalFileOwners table accessible under the job’s Results node

In addition to the tables and views created by the analysis task, the UX_CriticalFiles job produces the following preconfigured report:

ReportDescriptionDefault TagsReport Elements
Critical File OwnershipThis report lists the ownership of critical files across the audited environment. The top non-root users and groups with critical file ownership are highlighted.NoneThis report is comprised of three elements:
  • Table – Provides details on Top 5 Critical File Owners (Users)
  • Table – Provides details on Top 5 Critical File Owners (Groups)
  • Table – Provides information on Critical File Ownership Details