Skip to main content

UX_CriticalFiles Job

The UX_CriticalFiles job provides visibility into owners of critical files within audited Unix and Linux environments such as passwd, shadow, sudoers, hosts.deny, and more.

Queries for the UX_CriticalFiles Job

The UX_CriticalFIles job uses the Unix Data Collector for the following query:

CAUTION: The query is preconfigured for this job. Never modify the query.

Queries for the UX_CriticalFiles Job

The query for the UX_CriticalFiles job is:

  • Critical File Owners – Finds critical file ownership

Analysis Tasks for the UX_CriticalFiles Job

Navigate to the Unix > 2.Privileged Access > UX_CriticalFiles > Configure node and select Analysis to view the analysis tasks.

CAUTION: Do not modify or deselect the selected analysis tasks. The analysis tasks are preconfigured for this job.

Analysis Tasks for the UX_CriticalFiles Job

The default analysis task is:

  • Details critical file ownership, highlights top users

    • Creates SA_UX_PrivilegedAccess_CriticalFileOwnership table accessible under the job’s Results node
    • Creates SA_UX_PrivilegedAccess_CriticalFileOwners table accessible under the job’s Results node

In addition to the tables and views created by the analysis task, the UX_CriticalFiles job produces the following preconfigured report:

ReportDescriptionDefault TagsReport Elements
Critical File OwnershipThis report lists the ownership of critical files across the audited environment. The top non-root users and groups with critical file ownership are highlighted.NoneThis report is comprised of three elements: - Table – Provides details on Top 5 Critical File Owners (Users) - Table – Provides details on Top 5 Critical File Owners (Groups) - Table – Provides information on Critical File Ownership Details