IBM AIX

Version: IBM AIX 6.1 and 7.1

AIX (Advanced Interactive eXecutive, pronounced “a i ex”) is a series of proprietary UNIX operating systems developed and sold by IBM for several of its computer platforms.

Netsurion Data Source Integration for IBM AIX allows you to monitor the following components:-

  • Operations – Device management, Group management, File system activity, File management, Cron activity, Kernel process activity, Logical volume management activity, System resource controller and User management.
  • Security – Audit configuration, File access control changes, Password changed and Security objects audit.
  • Compliance – Administrator logon activity and User authentication failed.

Once IBM AIX is configured to deliver logs to Netsurion Open XDR; alerts, dashboards and reports can be configured into Netsurion Open XDR.

The following are the key Data Source Integration available in Netsurion Open XDR.

Alerts

Type Name Description
Security IBM AIX-Security role changed This alert is generated when administrator create, change and remove the security roles.
Operations IBM AIX-Device removed This alert is generated when administrator removes the device from the server.
Operations IBM AIX-System rebooted This alert is generated when administrator reboots the server.
Compliance IBM AIX-Account disabled This alert is generated when administrator disables the system accounting.

Reports

Type Name Description
Security IBM AIX-Audit configuration This report provides information related to audit configuration which include columns When, Computer, Who, Command, Action, Status and Message Details.
Security IBM AIX-File access control changes This report provides information related to file access control changes which include columns When, Computer, Who, Command, Action, Status and Message Details.
Security IBM AIX-Password changed This report provides information related to password activity which include columns When, Computer, Who, Command, Action, Status and Message Details.
Security IBM AIX-Security objects audit This report provides information related to security objects audit which include columns When, Computer, Who, Command, Action, Status and Message Details.
Operations IBM AIX-Cron activity This report provides information related to cron activity which include columns When, Computer, Who, Command, Action, Status and Message Details.
Operations IBM AIX-Device management This report provides information related to device management which include columns When, Computer, Who, Command, Action, Status and Message Details.
Operations IBM AIX-File management This report provides information related to file management which include columns When, Computer, Who, Command, Action, Status and Message Details.
Operations IBM AIX-File system activity This report provides information related to file system activity which include columns When, Computer, Who, Command, Action, Status and Message Details.
Operations IBM AIX-Group management This report provides information related to group management which include columns When, Computer, Who, Command, Action, Status and Message Details.
Operations IBM AIX-Kernel process activity This report provides information related to kernel process activity which include columns When, Computer, Who, Process Name, Action, Status and Message Details.
Operations IBM AIX-Logical volume management activity This report provides information related to logical volume activity which include columns When, Computer, Who, Command, Action, Status and Message Details.
Operations IBM AIX-System resource controller This report provides information related to system resource controller which include columns When, Computer, Who, Command, Action, Status and Message Details.
Operations IBM AIX-User management This report provides information related to user management which include columns When, Computer, Who, Action, Status and Target Account.
Compliance IBM AIX-Administrator logon activity This report provides information related to administrator logon activity which include columns When, Computer, Who, Command, Action and Message Details.
Compliance IBM AIX-User authentication failed This report provides information related to user authentication failed activity which include columns When, Computer, Who, Command and Message Details.

Documentation

The configuration details are consistent with Netsurion Open XDR 9.3 or later, and IBM AIX.

Download Integration Guide for configuration instructions and more information.