eTrust Audit iRecorder Reference Guide for CCURE 800/8000
Transcription
eTrust Audit iRecorder Reference Guide for CCURE 800/8000
eTrust Audit ™ iRecorder Reference Guide for CCURE 800/8000 1.5 SP2 This documentation and related computer software program (hereinafter referred to as the “Documentation”) is for the end user’s informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. (“CA”) at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user’s responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation “as is” without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage. The use of any product referenced in this documentation and this documentation is governed by the end user’s applicable license agreement. The manufacturer of this documentation is Computer Associates International, Inc. Provided with “Restricted Rights” as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions. 2003 Computer Associates International, Inc. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Contents Chapter 1: Welcome to iRecorder for CCURE 800/8000 5 What Is an iRecorder? ................................................................................................................................... 6 iRecorder Architecture.................................................................................................................................. 6 Chapter 2: Installation and Configuration 11 System Requirements.................................................................................................................................. 11 Hardware Requirements ................................................................................................................. 11 Pre-Installation Steps .................................................................................................................................. 11 Installing the iRecorder............................................................................................................................... 12 Installing the iRecorder from the eTrust Security Command Center CD ................................ 12 Installing the iRecorder Downloaded from eSupport................................................................. 12 Installing the iRecorder ................................................................................................................... 13 Silent Installation.............................................................................................................................. 13 Silent Uninstallation......................................................................................................................... 13 Generating a Response File for Custom Silent Installation ........................................................ 13 Windows Packages...................................................................................................................................... 14 Configuration and Use................................................................................................................................ 14 Starting the iRecorder ...................................................................................................................... 14 Stopping the iRecorder.................................................................................................................... 15 Chapter 3: Configuring the iRecorder 17 Enabling Debugging ........................................................................................................................ 17 Testing the iRecorder for CCURE 800/8000 (CCURE) ............................................................... 18 Chapter 4: Report Selection Criteria 21 Chapter 5: Adding the Default Policy Template for the iRecorder to the eTrust Audit Policy Manager 23 Configuring the Default Policy in the eTrust Audit Policy Manager................................................... 24 Sample Rules for CCURE 800/8000.......................................................................................................... 25 Contents iii Chapter 6: eTrust Audit Field Mapping 27 Native Product Fields (CCURE) ................................................................................................................ 27 eTrust Audit Mandatory Fields (CCURE)................................................................................................ 30 eTrust Audit Normalized Fields ............................................................................................................... 31 iv iRecorder Reference Guide for CCURE Chapter 1: Welcome to iRecorder for CCURE 800/8000 This guide describes how to install, configure, and use the eTrust Audit iRecorder for CCURE 800/8000. This iRecorder harvests log data from CCURE 800/8000 and forwards it to an eTrust Audit Client. CCure 800/8000 is security management system to control and manage physical access to secure areas. All personnel accessing the secure areas are required to use a badge to identify the person and associated privileges. The system is developed by Software House and further technical information on CCure 800/8000 system can be found at http://www.swhouse.com. This iRecorder was developed using CCure 800/8000 version 7. The CCure badge reader system consists of the following basic components: ■ Physical Tokens or badges issued to personnel ■ Badge readers mounted on various access points to the secure areas ■ ■ ■ ■ Controller system that controls badge readers to allow, disallow, raise alarms, and so on when the badge is scanned by a badge reader. Management system to configure and setup various authorization rules for badges and badge readers. A repository for personnel and asset information created when badges are issued. This repository can be accessed through ODBC and is called the CF Database in the CCure technical documentation. A repository for real-time events about badge accesses and other system activity. This repository can also be accessed through ODBC and is called the Journal database. During the life of the system, new Journals can be created as described in the CCure technical documentation. Each Journal is a separate database and is named as JL_xxxxx.db, where xxxxx is sequential number starting from 00001. Information on the current Journal Database in use can be determined from the CF Database. After the current Journal Database is identified, all events created due to user or system activity can be access from the Journal Database Welcome to iRecorder for CCURE 800/8000 5 What Is an iRecorder? What Is an iRecorder? eTrust Audit 1.5 recorders can be deployed in two different ways: Recorders Recorders are one of the subcomponents packaged with eTrust Audit 1.5 Client components. These predefined recorders use the eTrust Audit Submit API (SAPI) to send log events to a Router and Action Manager for further processing as defined in the Policy Manager. This architecture leads to some restrictions in the Recorder development and deployment: ■ ■ SAPI uses remote procedure calls (RPC), which makes recorders difficult to be easily deployed across firewalls Deployments of new recorders that are not predefined require you to make manual changes to existing Routers and Action Managers iRecorders iRecorders are new to eTrust Audit. They are developed using the iRecorder SDK, which is based on the iTechnololgy SDK. iRecorders can be easily deployed in an existing eTrust Audit environment without making significant changes to that environment. iRecorders, just like recorders, send log events to a Router and Action Manager for event processing. They require an intermediate component, known as an iRouter, which is installed on an existing eTrust Audit Client. The iRouter provides a bridge between the iRecorder and the eTrust Audit Client. The iRouter converts tokens from XML format to SAPI format and submits them to the Router. iRecorder Architecture The iRecorder architecture allows easy deployment across firewalls and new iRecorder development does not require changes in the existing eTrust Audit deployment. 6 iRecorder Reference Guide for CCURE iRecorder Architecture The following diagram illustrates the flow of information from the iRecorder to the eTrust Audit Client components: As you can see, an iRecorder really consists of several components that help capture, route, and convert the event data to SAPI format so that it can be processed by an eTrust Audit Client. The components of iTechnology are as follows: iGateway iGateway is a service that dynamically loads iSponsors and communicates with the other iGateways and iSponsors. The main features and functions of an iGateway are as follows: ■ ■ — Load the iSponsor Locate and read .conf files associated for various iSponsors in its local directory. Load the corresponding iSponsor DLLs (such as iControl or iRecorder) at iGateway start up or upon request from another iSponsor (local or remote). Welcome to iRecorder for CCURE 800/8000 7 iRecorder Architecture ■ ■ Provide configuration data found in .conf file to the corresponding iSponsor Support Data Communication The iGateway uses the HTTP/HTTPS protocol on port 5250 to handle all data communication as follows: ■ ■ ■ The data format for iGateway communication is based on XML. An iGateway receives XML formatted data from the local iSponsors and sends it to the specified iGateway for delivery to the appropriate iSponsor. An iGateway receives XML formatted data from a remote iSponsor and delivers it to the appropriate local iSponsor. Note: Each iGateway can be associated with a digital certificate used by iRecorders to sign all outgoing events. In addition, iRecorders include the digital certificate with its associated thumbprint for the first outgoing event. For all other events, only the thumbprint is included. iControl iControl is an iSponsor DLL that is automatically loaded by the iGateway and supports the following functions: Store and Forward (SAF) for guaranteed delivery of events as follows: If the iGateway cannot deliver an event, it is passed onto the iControl component for SAF handling. ■ ■ ■ iControl stores the undelivered events in a file. Periodically, iControl extracts events from the event file and attempts to deliver them using iGateway. All events that are extracted successfully are marked as “old,” and periodically iControl deletes the “old” events. Event validation ■ ■ ■ If it is the first event, save the digital certificate and the associated thumb print For all events, use the thumbprint included in the event to retrieve the matching certificate. If the certificate is not found, generate an error. Use the certificate to validate signature of the event. If the signatures do not match, generate error. Routes events to a remote iControl The iControl.conf file contains information related to routing and which Event plug-in should be loaded. Note: iControl can load multiple Event plug-ins and sends every event to each plug-in. 8 iRecorder Reference Guide for CCURE iRecorder Architecture Event Plug-in (EP) The Event plug-in is a DLL used by iControl to handle specialized tasks such as converting formats, applying filters, sending events to a database, and so on. EPAudit Plug-in If the EPAudit plug-in is configured, all events received by iControl are sent to the EPAudit plug-in to be delivered to the Router. The primary functions of EPAudit are to: ■ ■ Convert events from XML format to eTrust Audit SAPI format. Submit events to the eTrust Audit Router component running on the localhost. EPUnicenter Plug-in If the EPUnicenter plug-in is configured, all events received by iControl are sent to the EPUnicenter to be delivered to the Event Management component of Unicenter. The primary functions of the EPUnicenter plug-in are to: ■ ■ Convert events from XML format to Unicenter EM format. Submit events to the Event Management component running on the localhost. EPDebug Plug-in If the EPDebug plug-in is configured, all events received by iControl are sent to the EPDebug to be delivered to any Debug Viewer running on the local host. iRecorder iRecorder is an iSponsor DLL loaded by the iGateway running on the device generating log events. Its primary functions are as follows: ■ ■ ■ ■ ■ Extract the log events from the device or from an event log repository using an API, ODBC, or file I/O. Parse the event fields into tokens and create “Name–Value” pairs for each parsed token in XML format. Submit XML strings containing the events to a local or remote iRouter. The iRouter sends the events to EPAudit plug-in, which in turn submits the events to eTrust Audit for further action. For the first log event from the device, the iRecorder attaches the iGateway certificate as an attribute. For all log events, iRecorder includes the iGateway certificate thumbprint (a unique ID for the certificate) and the signature (hash of the whole event signed by the certificate). iRouter An iRouter is a collection of following components installed on the eTrust Audit Client machine: ■ iGateway Welcome to iRecorder for CCURE 800/8000 9 iRecorder Architecture ■ iControl ■ EPAudit plug-in The iRouter installation package is included with the iRecorder SDK and does not require any changes. It works with the existing and new iRecorders. The iRouter forwards all events to the eTrust Audit Client using SAPI. 10 iRecorder Reference Guide for CCURE Chapter 2: Installation and Configuration This chapter describes how to install and configure the iRecorder for CCURE 800/8000. System Requirements The topics that follow describe the hardware and software requirements for the iRecorder assuming that CCURE 800/8000 is already installed and operational on some host. Hardware Requirements The iRecorder for CCURE 800/8000 has the following minimum hardware requirements: ■ Approximately 10 MB of disk space for the iRecorder installation. The iRecorder for CCURE 800/8000 has the following platform requirements: ■ x86 PC running Windows 2000 with Service Pack 2 ■ Access to a CCURE 800/8000 system running version 7.1 ■ CCURE 7.1 Client and ODBC driver (must be pre-installed) Pre-Installation Steps Install the CCURE Client and ODBC driver on the same machine where the iRecorder will be installed. Before you install and setup an iRecorder, you need to install the iRouter component on a host where eTrust Audit Client components are installed. iRouter lets iRecorders communicate with eTrust Audit. During the iRecorder installation, you are prompted for the host where iRouter is installed. For more details on how to install iRouter, see the iRouter Reference Guide. The eTrust Audit Policy Manager must be installed somewhere on the network, along with the eTrust Audit Data Tools. Installation and Configuration 11 Installing the iRecorder Installing the iRecorder The following topics describe how to install the iRecorder for CCURE 800/8000 from the CD or from the web. Installing the iRecorder from the eTrust Security Command Center CD To install the iRecorder from the eTrust Security Command Center CD, insert CD 5 into the CD drive. The Product Explorer should automatically start and display the installation menu. If the Product Explorer does not automatically start, click Start, Run and enter the following command: [CD-Drive]:\PE_I386.exe where [CD-Drive] is your CD drive letter designation. All iRecorders available on the eTrust Security Command Center CD are located as follows eTrust, Audit, iRecorders. To install an iRecorder, select the appropriate recorder from the list and follow the detailed install instructions provided in the following sections. Installing the iRecorder Downloaded from eSupport You can also download and install an iRecorder from the web. To install the downloaded package, you will need two components: 1. iRecorder installation package from http://esupport.ca.com 2. Appropriate (Windows, UNIX) iGateway package from ftp://ftp.ca.com/pub/itech/downloads Download these packages into the same directory and run the iRecorder install package. The iRecorder install package automatically installs the iGateway package, if needed. Detailed installation instructions for the iRecorder are provided in the next topic. 12 iRecorder Reference Guide for CCURE Installing the iRecorder Installing the iRecorder If the install package for the iRecorder is not running already, run the package CCureODBC _<version number>.exe to start installation of the iRecorder. It starts a wizard that guides you through installation and configuration of the iRecorder. Silent Installation Enter the following command to silently install the CCure iRecorder using an InstallShield response file: CCureODBC_<version>.exe /s /f1 “ccureodbc_setup.iss” The above example demonstrates the silent install capability provided by the iRecorder package. The response file in the example should be changed to reflect the particular conditions of the target environment. See How to Generate a Response File for Custom Silent Installation. Silent Uninstallation Enter the following command to silently uninstall the CCure iRecorder using an InstallShield response file: CCureODBC_<version>.exe /s /f1 “ccureodbc_uninstall.iss” Generating a Response File for Custom Silent Installation The response files provided with the package contain an example of a silent install session. It is often necessary to customize the silent installation to the particular needs of the enterprise. The sections below provide instructions on how to customize silent installation. Choose a system that is similar if not identical to the target system. Installation and Configuration 13 Windows Packages Windows Packages Note: The system must not contain the iRecorder for which you want to customize the silent installation. If the system has the iRecorder installed, uninstall the iRecorder using the Add/Remove Program option of the Control Panel. Proceed as follows to generate a custom response file: 1. Open a DOS window 2. Change directory to the folder that contains the iRecorder package 3. On the CD labeled “eTrust Audit 1.5 SP2 “ part of the eTrust Security Command Center package, the iRecorder package folder is: <CD Drive>:\eTrust\Audit\iRecorder\Winnt For instance, if G drive is the CD drive, the iRecorder package folder is: G:\eTrust\Audit\iRecorder Enter the following: <iRecorder package>.exe /r /f1”<pathname of response file>“ For example: CCureODBC_<version>.exe /r /f1”C:\Temp\irecorder_setup.iss” 4. Follow instructions given by the installation procedure and install the package as you would do on the target system. 5. Click Finish. The response file is generated. It can be used for silent installation on similar target systems. Configuration and Use The following topics describe how to configure and use the iRecorder. Starting the iRecorder The iRecorder is run as a sub-component of the iTechnology-iGateway service. To start the iRecorder on Windows 2000, start the iGateway service using either of the following methods: ■ Use the Services Management GUI (Start, Control Panel, Services or Administrative Tools, Services). 14 iRecorder Reference Guide for CCURE Configuration and Use ■ Issue the following command: net start igateway Stopping the iRecorder The iRecorder is run as a sub-component of the iTechnology-iGateway service. To stop the iRecorder on Windows 2000, stop the iGateway service using either of the following methods: ■ ■ Use the Services Management GUI (Start, Control Panel, Services or Administrative Tools, Services). Issue the following command: net stop igateway Installation and Configuration 15 Chapter 3: Configuring the iRecorder iRecorder configuration parameters are kept in a configuration file usually located in the iGateway installation directory. The iRecorder configuration parameters are automatically set during iRecorder installation and do not require any changes for the normal operation of the iRecorder. If any parameters need to be modified, you must stop the iTechnology iGateway service or daemon before making the changes. After making the changes, restart the service for changes to take effect. The iRecorder configuration file is named irecordername.conf and is found in the iGateway installation directory. For example: \Program Files\CA\iGateway on Windows and /opt/CA/igateway on UNIXx/Linux. Sample Configuration File (CCURE) The following is a sample CCureODBC.conf configuration file: <?xml version='1.0' encoding='UTF-8' standalone='no'?> <iSponsor> <Name>CCureODBC</Name> <ISType>DSP</ISType> <ImageName>CCureODBC</ImageName> <DispatchEP>iDispatch</DispatchEP> <ClsPath></ClsPath> <LibPath></LibPath> <Version>@VERSION@</Version> <PreLoad>true</PreLoad> <DBHost def=“localhost” prompt=“Servername where the CCure Server is installed” type=“text”>localhost</DBHost> <CFUsername def=“SYSPROGRESS” prompt=“Username used to access the CF database on the CCure Server” type=“text”>SYSPROGRESS</CFUsername> <CFPassword prompt=“User Password used to access the CF database on the CCure Server” type=“password”></CFPassword> <JNUsername def=“SYSPROGRESS” prompt=“Username used to access the JOURNAL database on the CCure Server” type=“text”>SYSPROGRESS</JNUsername> <JNPassword prompt=“User Password used to access the JOURNAL database on the CCure Server” type=“password”></JNPassword> </iSponsor> Enabling Debugging You can configure the iRecorder to output debugging information to a debugging application or to a file. A file containing debug information can be useful for technical support purposes. To enable debugging and log debug information to a file, follow these steps: 1. Stop the iRecorder by stopping the iTechnology iGateway Service. Configuring the iRecorder 17 Configuration and Use 2. Edit the iRecorder configuration file by adding the following <DebugLevel> tag between the <iSponsor> tags: <DebugLevel>{level}</DebugLevel> where {level} is one of the following: ISP_NOLEVEL Disables debugging. ISP_FILE Prints all debug messages to a debug application as well as writing it to a log file, irecordername.log, in the same directory as the iRecorder. The debug file may grow very quickly; to avoid possible disk space shortage, we recommend turning off the debugging option as soon as possible by replacing ISP_FILE by ISP_NOLEVEL. 3. Save the configuration file. 4. Start the iRecorder by restarting the iTechnology iGateway Service. 5. Send the debug file to CA Technical Support for further analysis. Testing the iRecorder for CCURE 800/8000 (CCURE) Using the following steps, you can verify that the iRecorder is installed properly and sending events to eTrust Audit: 1. Install the iRecorder for CCURE on a Windows host. 2. Install iRouter component on a host where eTrust Audit Client components are installed. 3. Verify that the <windir>\System32\Driver\etc\services file contains the following entries: CFSRV 2500/tcp # CCURE800: Progress CF database server # JNSRV 2501/tcp # CCURE800: Progress JOURN database server, not used, see G#2718 JNSRV1 2502/tcp # CCURE800: Progress JOURN database server 1 JNSRV2 2503/tcp # CCURE800: Progress JOURN database server 2 JNSRV3 2504/tcp # CCURE800: Progress JOURN database server 3 JNSRV4 2505/tcp # CCURE800: Progress JOURN database server 4 (not yet used) CCDRVR 2600/tcp # CCURE800: ApC Driver 4. Verify that <Program Files>\CA\iGateway contains the following files: ■ CCureODBC.dll ■ CCureODBC.conf 5. Run the eTrust Audit Policy Manager. 6. Copy the default policy for the CCURE Badge to a new one. 7. Choose the collection rule and add an action to it by right clicking on the rule, choosing properties and then actions (with a machine running the eTrust Audit Security Monitor as the target of the Security Monitor action). 18 iRecorder Reference Guide for CCURE Configuration and Use 8. Create a new group in the AN (Audit Node) window, then add the iRouter machine as a new CCURE Badge source. 9. Attach the newly created AN group to the policy you have just created. 10. Switch back to the Policy window. 11. Right-click the policy you created, and then select the Activate command to activate the policy. 12. On the CCURE server, log into the Administration or Monitoring Client. You will see a Login event as soon as you open the eTrust Audit Security Monitor. 13. Verify that the generated events are displayed in the eTrust Audit Security Monitor iRecorders also support standard iTechnology SDK tools (like TestHarness and Spin interface) to query the iRecorder for current status and configuration information. For more details on these tools, use iTechnology SDK Reference Guide. Configuring the iRecorder 19 Chapter 4: Report Selection Criteria For events that are reported by the iRecorder and stored in the eTrust Audit Collector database, selected reports can be generated using a Report Generator. The following table describes suggested selection criteria for reports of general interest. The first column of the table is the Report Name. The second column is the Audit Logname that can be specified to include all events for this Logname in the report. Additional Criteria column specifies one or more additional fields that may be used to further narrows the range of events to be included in the report. Finally the Comment column specifies whether the field name is in the Audit MSGTEXT field or not. The distinction is important because the MSGTEXT field is a free form text field that may contain several fields. Since the MSGTEXT column contains multiple field name and field value pairs, the MSGTEXT field must be searched using wild card characters to select the specific field names and values. Sample Report Selection Criteria for CCure Badge Report Logname AND additional criteria (format field name : field value) Comment Login Failure CCure Badge Integer NID: 1, Integer OID: 1 OID is in MSGTEXT field Login Success CCure Badge Integer NID: 1, Integer OID: 2 OID is in MSGTEXT field Badge In CCure Badge Integer NID: 2, Subcat: “Badge In” Subcat is in MSGTEXT field Badge Out CCure Badge Integer NID: 2, Subcat: “Badge Out” Subcat is in MSGTEXT field Report Selection Criteria 21 Chapter 5: Adding the Default Policy Template for the iRecorder to the eTrust Audit Policy Manager To be able to create policy for CCURE 800/8000, you must add the default policy template for the iRecorder to the Policy Manager. To add the default template, follow these steps: 1. On the eTrust Audit Policy Manager server, open the following file: [eTrust Audit install]\bin\pmu_template_exchange.exe. The following window appears: 2. Choose Import Policy Template from binary file, and then click Next. 3. Next, enter the path of eTrust Audit CCure iRecorder Policy.ptf. This file is in the iGateway installation directory. Click Next. 4. Select Next again. This dialog explains the description of the policy file. 5. The next dialog asks if you want to create the policy in the default policies section. Select Yes, and then click Next. 6. Enter CCure Badge as the name of the inserted subpolicy, and click Finish. Adding the Default Policy Template for the iRecorder to the eTrust Audit Policy Manager 23 Configuring the Default Policy in the eTrust Audit Policy Manager Configuring the Default Policy in the eTrust Audit Policy Manager This topic is provided as a brief guide on how to configure the policy for the iRecorder. For further details, see the eTrust Audit Policy Management Guide. 1. Open the eTrust Audit Policy Manager. 2. On the left hand pane, click Audit Nodes. 3. Select the Targets node, right-click, and choose New Group from the pop-up menu. 4. Give the new group a descriptive name, such as CCure ODBC. 5. Right-click CCure ODBC, and select New AN from the pop-up menu. 6. Enter the host name of the iRouter that you have configured the iRecorder to communicate with. 7. Select the AN type as CCure ODBC. 8. Enter a description for the AN node. 9. Click OK. Repeat steps 5 through 8 for each iRouter in your network that a CCure iRecorder communicates with. 10. On the left hand pane, select Policies. 11. From the menu bar, select File, and choose New. 12. Select Policy Folder, this should be the only available option, and give the folder a name, such as CCure ODBC. 13. Right-click the CCure ODBC folder, and choose New Policy from the pop-up menu. 14. Select Policy by Template, and choose eTrust Audit CCure ODBC iRecorder Policy. 15. Enter a name, such as CCure ODBC Policy, and click Finish. 16. An action must be defined for each rule. For the purposes of this guide, we will define an action for the All Events rule. 17. Right-click the All Events rule, and choose Properties from the pop-up menu. 18. Click the Action tab. 19. Check the box, for the Collector action. 20. Click Add, and enter the host name or IP address of the eTrust Audit Collector. 21. Repeat these steps 19 and 20 for the Security Monitor action. 22. Click OK when finished. 24 iRecorder Reference Guide for CCURE Sample Rules for CCURE 800/8000 This causes the icon for the All Events rule to turn from a white bell, to a blue bell. 23. Click the bell to select the rule. This turns the color of the bell to red. 24. Right-click the CCure ODBC folder, and choose Attach AN Group from the pop-up menu. 25. Select the CCure ODBC AN group, and click OK. 26. Right-click the CCure ODBC folder, and click Activate. 27. Click OK, when the confirmation dialog box appears. 28. From the left pane click Audit Nodes. 29. Select the CCure ODBC Group, and verify for each AN, that there are no errors. If there are no errors, then there will be a key icon in the Name of each AN. Sample Rules for CCURE 800/8000 The Report Selection CCure iRecorder Policy.ptf file includes 3 sample rules: Badge In Detect all badge in events. Badge Out Detect all badge out events. Login Failure Detect login failure to CCure applications. Adding the Default Policy Template for the iRecorder to the eTrust Audit Policy Manager 25 Chapter 6: eTrust Audit Field Mapping The following topics describe how fields in CCURE 800/8000 events are captured by the eTrust Audit iRecorder and mapped to a standard set of normalized fields. eTrust Audit requires all iRecorder to follow a standard Data Model and Taxonomy. The following topics describe how the iRecorder for CCURE 800/8000 maps the native CCURE 800/8000 fields into eTrust Audit fields Native Product Fields (CCURE) CCure Journal Event Data Structure Field Name Data Type Description Jnl_ID Int Unique ID for message (max of 2 billion) Local_DT Int Encoded Date/Time activity actually occurred Host_DT Int Encoded Date/Time message was received at host TZ_Offset Int Time-zone offset in half-hours Msg_Code Int Message Code for activity User_PID Int PID of person associated with activity Int_Data1 Int May only contain object IDs Int_Data2 Int May contain either Object IDs, or codes < 1000 Int_Data3 Int May contain either personnel ID (PIDs), or codes < 1000 Int_Data4 Int May not contain object IDs or PIDs Txt_Data1 Char A message specific text string Txt_Data2 Char Another message specific text string eTrust Audit Field Mapping 27 Native Product Fields (CCURE) CCure Journal Event Data Format Msg Code Desc 001 User Login/ Logout 002 Card Admitt ed 003 Card Rejecte d 004 Log Messag e 005 Object Change d State (Event, Distrib utd, Manual ) 006 Manual Action 007 System Activity (Norma l) 008 System Error User_PID Supplied PID User Int_ Data1 Int_ Data2 Int_ Data3 None Program started PRM$JP R_ xxx Login/out Code PRM$JLO_ xxx Int_ Data4 Txt_ Data1 Txt_ Data2 None Node User name - if invalid Card Number None None PID DoorI D Admit Code Sec Officer ID, if admitted manually PID DoorI D Admit Code Reject Code PRM$JRE_xx x Card Number None None SO ID; PID User Event Object ID None JNL ID of related activity Text of Log Messa ge None PID ID of Object Chang ing the state None State Code StateCha nge Method Code/iSt ar Connecti on Code None None SO ID; PID User ID of Object Acted On Action Code Manual Action Object ID Manual Action PRM$JM A_xxx None None None Activity Code PRM$JSM_x xx None Node Name Mac Name None System Error Code PRM$JSE_xx x API Error Code Node Name API Name No No None None 28 iRecorder Reference Guide for CCURE None Native Product Fields (CCURE) Msg Code Desc 009 Device Activity (Norma l) 010 Device Error / Recover y User_PID Supplied Int_ Data1 PID ID of Unit or Comp onent No Int_ Data2 Int_ Data3 Int_ Data4 Txt_ Data1 Txt_ Data2 Another Object ID Activity Code PRM$JDM_x xx None Firmw are Versio n None ID of Unit or Comp onent Another Object ID Error Code PRM$JDE_xx x SubError Code (paging) Firmw are Versio n None Asset ID None Info Code PRM$JA T_xxx PersonID Access Code None None Asset ID Reade r ID PersonID Access Code Tag Numb er AreaID Asset ID Reade r ID PersonID Access Code Tag Numb er AreaID Asset ID Reade r ID PersonID Access Code Tag Numb er AreaID HHRId PersonID Access Code Tag Numb er None 011 Asset Activity 012 Asset Movem ent Authori zed 013 Asset Movem ent Unauth orized 014 Asset Movem ent Attemp ted 015 Asset Locatio n Update Asset ID Area ID 016 Watcht our Action PID Action Code ObjectID TourGaurdI D ? None None 017 Watcht our Activity No InfoC ode ObjectID TourGaurdI D ReaderID None None HHRId HHRId (none) eTrust Audit Field Mapping 29 eTrust Audit Mandatory Fields (CCURE) Msg Code Desc User_PID Supplied Int_ Data1 Int_ Data2 Int_ Data3 Int_ Data4 Txt_ Data1 Txt_ Data2 018 Watcht our Error No InfoC ode ObjectID TourGaurdI D ? None None 019 Watcht our Stop Activity No InfoC ode ObjectID TourGaurdI D TourStop ID None None 020 NetVid eo Activity PID Camer aID NetVide oActionI D None EventID Segme ntID None eTrust Audit Mandatory Fields (CCURE) Mandatory fields are a fixed set of fields that are added to each event processed by any iRecorders. The following tables describe what values are assigned to the Mandatory Fields in the iRecorder for <irecroder>. Required Fields Field Name Field Value Description Taxonomy <Category>.<System>. <Action>.<Result>. <Severity> See Table 2 for further breakdown of Taxonomy Date Timestamp host_dt TimeZone timezone in +/- seconds format (calculated from GMT) TimeZone of system where iRecorder is installed Src Variable Journal Name Log CCure Badge Location Variable Location of CCure Database Table 1: Mapping of eTrust Audit Required fields The table provides Field Names, Descriptions as well as Values (or possible values). Additional information about the Taxonomy field is provided in Table 2 below. 30 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Taxonomy Taxonomy Possible Values Category Not defined yet System Not defined yet Action Not defined yet Result Not defined yet Severity Not defined yet Description Table 2: Details of Taxonomy Field eTrust Audit Normalized Fields Normalized Fields are eTrust Audit field names that are mapped or translated from the native event field names according to the classification of the iRecorder. Normalized fields are common across all products in the same classification. The Taxonomy field, one of the mandatory fields, defines the classification of this iRecorder. eTrust Audit Field Mapping 31 eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 001 – User Login/Logout eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” System Access “Status” See Message Code List 1 “State” See Message Code List 1 “User” User_PID Operation “Oper” See Message Code List 1 “ObjClass” See Message Code List 1 “ObjName” See Message Code List 1 Native “OID” Int_Data3 Native ID “NID” MsgCode Secondary “SObjClass” Program Secondary “SObjName Program Secondary “SObjID” Int_Data2 “Node” Txt_Data1 “Invalid User” See Message Code List 1 Info Info 32 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 1 Status State Oper Obj Class Obj Name 1 PRM$JLO_User_Logged_In S Access Login Login LoginCode 2 PRM$JLO_Login_Attempt_ Rejected F Fail Login Login LoginCode 3 PRM$JLO_User_Logged_ Out S Normal Logout Logou t LogoutCode 4 PRM$JLO_Disconected F Error Logout Login LogoutCode Invalid User Invalid User Message Code List 1 Field Mapping for CCure Event: Message Code 002 – Card Admitted eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet. “User” User_PID “Badge” CardNumber “Category” Physical Security “Location” Int_Data1 “Status” See Message Code List 1 “State” See Message Code List 1 Operation “Oper” Card Access “ObjClass” Card “ObjName” AdmitCode Native “OID” Int_Data2 Native ID “NID” MsgCode Info Info eTrust Audit Field Mapping 33 eTrust Audit Normalized Fields Message Code List 1 Message Code List 1 Status State 1 PRM$JAD_Door_Unused F Admit 2 PRM$JAD_Noticed F Admit 3 PRM$JAD_Duress F Admit 4 PRM$JAD_Host F Admit 5 PRM$JAD_Manual F Admit 6 PRM$JAD_Deleted F Admit 7 PRM$JAD_Direction_IN S Admit PRM$JAD_Direction_OUT S Admit 8 Field Mapping for CCure Event: Message Code 003 – Card Rejected eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “User” User_PID “Badge” CardNumber “Category” Physical Security “Location” Int_Data1 “Status” F “State” Reject Operation “Oper” Card Access “ObjClass” Card “ObjName” RejectCode Native “OID” Int_Data3 Native ID “NID” MsgCode “AdmitCode” Int_Data2 Info Info 34 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 1 Message Code List 1 1 PRM$JRE_Admit 2 PRM$JRE_Unknown_Card 3 PRM$JRE_Clearence 4 PRM$JRE_Facility_Code 5 PRM$JRE_Site_code 6 PRM$JRE_PIN 7 PRM$JRE_Issue_Code 8 PRM$JRE_Lost 9 PRM$JRE_Disabled 10 PRM$JRE_Expired 11 PRM$JRE_Not_Activated 12 PRM$JRE_Not_Downloaded 13 PRM$JRE_Illegal_Reject_Code 14 PRM$JRE_Misread 15 PRM$JRE_Tailgate 16 PRM$JRE_Passback 17 PRM$JRE_Timed_AP 18 PRM$JRE_Floor 19 PRM$JRE_Linked_Asset 20 PRM$JRE_RSRV1 21 PRM$JRE_RSRV2 22 PRM$JRE_Invalid_Escort 23 PRM$JRE_No_Escort eTrust Audit Field Mapping 35 eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 004 – Log Message eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Object Access “Status” S “State” Normal “User” User_PID “ObjClass” Log “ObjName” EventID Native “OID” Int_Data1 Native ID “NID” MsgCode Info LogMessage:Txt_Data1 36 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 005 – Object Changed State (Event, Distributed, Manual) eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “Status” See Message Code List 1 “State” See Message Code List 1 “User” User_PID Operation “Oper” Obj State Change “ObjClass” See Message Code List 1 “ObjName” ObjectID Native “OID” Int_Data1 Native ID “NID” MsgCode Secondary “SObjClass” State Secondary “SObjName StateCode Secondary “SObjID” Int_Data3 “StateChange MethodCode” Int_Data4 Info Info eTrust Audit Field Mapping 37 eTrust Audit Normalized Fields Message Code List 1 Message Code List 1 Status State Severity 1 PRM$OST_None S None Info Generic 2 PRM$OST_Active S Active Info Generic 3 PRM$OST_Inactive S Inactive Info Generic 4 PRM$OST_Mom_Active S Inactive Warning Generic 5 PRM$OST_On_Line S Online Info Generic 6 PRM$OST_Off_line S Offline Warning Generic 7 PRM$OST_Supervision F Error Warning Supervisor 8 PRM$OST_Grounded_Loop S Info Info Supervisor 9 PRM$OST_Shorted_Loop S Info Info Supervisor 10 PRM$OST_Open_Loop S Info Info Supervisor 11 PRM$OST_Fault S Info Info Supervisor 12 PRM$OST_Locked F Locked Info Generic 13 PRM$OST_Unlocked S Unlocked Info Generic 14 PRM$OST_Secure S Armed Info Generic 15 PRM$OST_Armed S Armed Info Generic 16 PRM$OST_Disarmed S Disarmed Info Generic 17 PRM$OST_Neutral S Undefined Info Generic 18 PRM$OST_Active_in_TimeSpec S Active Info Generic 19 PRM$OST_Active_Outside_ TimeSpec S Active Info Generic 20 PRM$OST_ADA_Unlocked S Unlocked Info Generic 21 PRM$OST_Reader_1 22 PRM$OST_Reader_2 23 PRM$OST_Door_Switch_ Monitor 24 PRM$OST_Door_Latch_Monitor 25 PRM$OST_Request_To_Exit 26 PRM$OST_Door_Forced S Forced Critical Door 27 PRM$OST_Door_Held F Held Warning Door 38 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 1 Status State Severity 28 PRM$OST_Admit S Admit Info Card 29 PRM$OST_Reject F Reject Warning Card 30 PRM$OST_Visitor_Admit S Admit Info Visitor 31 PRM$OST_Visitor_Reject F Reject Warning Visitor 32 PRM$OST_Noticed_Admit S Admit Info Card 33 PRM$OST_Noticed_Reject F Reject Warning Card 34 PRM$OST_Map 35 PRM$OST_Duress F Duress Critical Card 36 PRM$OST_Comm_Port 37 PRM$OST_Tamper F Tamper Warning Generic 38 PRM$OST_Power_Failure F PowerFailure Critical Generic 39 PRM$OST_Communications_ Failure F CommFailure Warning Generic 40 PRM$OST_Communications_ Restored S Normal Info Generic 41 PRM$OST_Power_Restored S PowerRestored Info Generic 42 PRM$OST_Tamper_Cleared S Normal Info Generic 43 PRM$OST_Door_Closed S Close Info Door 44 PRM$OST_Door_Open S Open Warning Door 45 PRM$OST_Supervision_Cleared F Error Warning Supervisor 46 PRM$OST_Grounded_Loop_ Cleared S Info Info Supervisor 47 PRM$OST_Shorted_Loop_ Cleared S Info Info Supervisor 48 PRM$OST_Open_Loop_Cleared S Info Info Supervisor 49 PRM$OST_Fault_Cleared S Info Info Supervisor 50 PRM$OST_Acknowledge S Ack Info Generic 51 PRM$OST_Mom_Unlock S Locked Info Generic 52 PRM$OST_Reset_Actions 53 PRM$OST_Area_Enter_Event 54 PRM$OST_Area_Exit_Event eTrust Audit Field Mapping 39 eTrust Audit Normalized Fields Message Code List 1 Status State Severity 55 PRM$OST_Door_Enter_Area 56 PRM$OST_Door_Exit_Area 57 PRM$OST_Controlled Access S Access Info Generic 58 PRM$OST_Uncontrolled_Access S Access Warning Generic 59 PRM$OST_Elevator 60 PRM$OST_Elevator_Floor 61 PRM$OST_Connection_Failure F Error Warning Generic 62 PRM$OST_Asset_Overdue 63 PRM$OST_Event_Ack_Overdue 64 PRM$OST_In_Directional_Input 65 PRM$OST_Out_Directional_ Input 66 PRM$OST_Stationary 67 PRM$OST_Portable 68 PRM$OST_Unauthorized_ Portable 69 PRM$OST_Noticed 70 PRM$OST_Unauthorized_ Noticed 71 PRM$OST_Asset_Reject F Denied Warning Card 72 PRM$OST_Asset_Area_Enter 73 PRM$OST_Asset_Area_Exit 74 PRM$OST_Reader_3 75 PRM$OST_Reader_4 76 PRM$OST_Reader_1_2 77 PRM$OST_Reader_3_4 78 PRM$OST_Reader_1_3 79 PRM$OST_Reader_2_4 80 PRM$OST_Reader_1_2_3_4 81 PRM$OST_Asset_Checkin S Info Info Generic 40 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 1 Status State Severity 82 PRM$OST_Printer_Buffer_ Overflow F Error Warning Printer 83 PRM$OST_Printer_Abnormal F Error Warning Printer 84 PRM$OST_Printer_Paper_Jam F Error Warning Printer 85 PRM$OST_Printer_Out_Of_ Paper F Error Warning Printer 86 PRM$OST_Printer_Offline F Error Warning Printer 87 PRM$OST_Printer_General_ Error 88 PRM$OST_Printer_Normal S Active Info Printer 89 PRM$OST_Printer_Overflow_ Buffer_Cleared S Active Info Printer 90 PRM$OST_Printer_Paper_Jam_ Cleared S Active Info Printer 91 PRM$OST_Printer_Out_of_Paper _Cleared S Active Info Printer 92 PRM$OST_Printer_Online S Active Info Printer 93 PRM$OST_Printer_General_ Error_Cleared F Error Warning Printer 94 PRM$OST_PIN_Required F Error Warning Generic 95 PRM$OST_PIN_Disabled F Disabled Warning Generic 96 PRM$OST_Printer_Power_Off F Inactive Warning Printer 97 PRM$OST_Printer_Power_On S Active Info Printer 98 PRM$OST_Page_Fault F Error Warning Generic 99 PRM$OST_Email_Failed F Error Warning Generic 100 PRM$OST_Control_Zone_Mode_ Secure S Secure Info Intrusion 101 PRM$OST_Control_Zone_Mode_ Access S Access Warning Intrusion 102 PRM$OST_Control_Zone_Access _Input S Disarmed Warning Intrusion 103 PRM$OST_Control_Zone_Secure _Input S Armed Info Intrusion eTrust Audit Field Mapping 41 eTrust Audit Normalized Fields Message Code List 1 Status State Severity 104 PRM$OST_Control_Zone_Access _Tamper S Disarmed Warning Intrusion 105 PRM$OST_Control_Zone_Secure _Tamper S Armed Info Intrusion 106 PRM$OST_Control_Zone_Access _Output S Disarmed Warning Intrusion 107 PRM$OST_Control_Zone_Secure _Output S Armed Info Intrusion 108 PRM$OST_Control_Zone_ Violated_Output F Error Warning Intrusion 109 PRM$OST_Control_Zone_Input_ Off_Normal F Error Warning Intrusion 110 PRM$OST_Control_Zone_Input_ Normal S Active Info Intrusion 111 PRM$OST_Control_Zone_Door_ Open S Open Warning Intrusion 112 PRM$OST_Control_Zone_Door_ Closed S Close Info Intrusion 113 PRM$OST_Control_Zone_ General_Input S Active Info Intrusion 114 PRM$OST_Primary_Comm_ Method_Fail F Error Warning Generic 115 PRM$OST_Secondary_Comm_ Method_Fail F Error Warning Generic 116 PRM$OST_Control_Zone_State_ Violated F Error Warning Intrusion 117 PRM$OST_Control_Zone_Not_ Secure S Access Warning Intrusion 118 PRM$OST_Control_Zone_Access _Secure_Input S Access Warning Intrusion 119 PRM$OST_Primary_Comm_ Method_Fail_Host F Error Warning Generic 120 PRM$OST_Secondary_Comm_ Test_Restored S Active Info Generic 212 PRM$OST_Slave_Master_Comm _Fail F Error Warning Generic 42 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 1 Status State Severity 122 PRM$OST_Secondary_Comm_ Test_Fail F Error Warning Generic 123 PRM$OST_Low_Battery S Error Warning Generic 124 PRM$OST_Primary_Comm_ Method_Restored_Host S Active Info Generic 125 PRM$OST_Secondary_Comm_ Method_Restored_Host S Active Info Generic 126 PRM$OST_Cluster_Split S Active Info Generic 127 PRM$OST_Cluster_Not_Split S Normal Info Generic 128 PRM$OST_Secondary_Comm_ Method_Fail_Host F Error Warning Generic 129 PRM$OST_Panel_Full S Error Warning Generic 130 PRM$OST_Panel_Nearly_Full S Warning Warning Generic 131 PRM$OST_Panel_Not_Full S Active Info Generic 132 PRM$OST_Panel_Not_Nearly_ Full S Warning Warning Generic 133 PRM$OST_Admit_Reject_CCTV S Error Warning Generic 134 PRM$OST_Shunt_Expire_ Warning S Normal Info Generic 135 PRM$OST_TourStop_Input S Normal Info Generic 136 PRM$OST_Tour_End_Early S Warning Warning Generic 137 PRM$OST_Tour_End_Late S Warning Warning Generic 138 PRM$OST_TourSTop_Reached_ OutOfSeq S Warning Warning Generic 139 PRM$OST_TourAtop_Reached_ Early S Warning Warning Generic 140 PRM$OST_Tour_Stop_Reached_ Late S Warning Warning Generic 141 PRM$OST_RadReceiver_Battery_ Fail F Error Warning Generic 142 PRM$OST_RadReceiver_Battery_ Restored S Active Info Generic 143 PRM$OST_Door_Position_ Sensor S Change Warning Door eTrust Audit Field Mapping 43 eTrust Audit Normalized Fields Message Code List 1 Status State Severity 144 PRM$OST_Lock_Status_Sensor S Change Warning Generic 145 PRM$OST_Set_Event S Info Generic 146 PRM$OST_Reset_Event S Info Generic Field Mapping for CCure Event: Message Code 006 – Manual Action eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” Action “Status” S “State” Normal “User” User_PID Operation “Oper” Scheduled “ObjClass” Generic “ObjName” ObjectID Native “OID” Int_Data1 Native ID “NID” MsgCode Secondary “SObjClass” Action Secondary “SObjName ActionCode Secondary “SObjID” Int_Data2 “ManualAction” Int_Data4 Info Info 44 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 2 Message Code List 2 Severity 1 PRM$JMA_Scheduled Info 2 PRM$JMA_Activated Info 3 PRM$JMA_Cancelled Warning 4 PRM$JMA_Deactivated Info 5 PRM$JMA_Momentary Info 6 PRM$JMA_Acknowledge Info 7 PRM$JMA_Reset_Actions Warning Field Mapping for CCure Event: Message Code 007 – System Activity (Normal) eTrust Audit Field Name CCure Event Field “Taxonomy” Note defined yet “Category” Security Systems “SubCat” System “Status” S “State” Normal Operation “Oper” See Message Code List 1 “ObjClass” SysActivity “ObjName” ActivityCode Native “OID” Int_Data3 Native ID “NID” MsgCode Secondary “SObjClass” Node Secondary “SObjName NodeName Secondary “SObjID” Txt_Data1 “Mac Name” Txt_Data2 Info Info eTrust Audit Field Mapping 45 eTrust Audit Normalized Fields Message Code List 1 Message Code List 1 Severity Oper 1 PRM$JSM_System_Startup Info Startup 2 PRM$JSM_System_Shutdown Info Shutdown 3 PRM$JSM_Journal_File_Changed Info FileChange 4 PRM$JSM_System_Backup_Start Info Backup 5 PRM$JSM_Controller_Denied Warning Rejected Field Mapping for CCure Event: Message Code 008 – System Error eTrust Audit Field Name CCure Event Field “Category” System Access “SubCat” System “Status” F “State” Error “Severity” Critical “API Code” See Message Code List 1 “ObjClass” SysActivity “ObjName” ActivityCode Native “OID” Int_Data3 Native ID “NID” MsgCode Secondary “SObjClass” Node Secondary “SObjName NodeName Secondary “SObjID” Txt_Data1 Info System Error 46 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 1 Message Code List 1 1 PRM$JSE_Disk_error 2 PRM$JSE_Database_error 3 PRM$JSE_API_Call_Failed 4 PRM$JSE_Thread_Init_Failure 5 PRM$JSE_Using_Mouse_Port 6 PRM$JSE_Error_While_Allocating_Port 7 PRM$JSE_Disk_Space_Low 8 PRM$JSE_Site_Expired 9 PRM$JSE_Site_Will_Expire 10 PRM$JSE_SSA_Expired 11 PRM$JSE_SSA_Will_Expire 12 PRM$JSE_Badging_Expired 13 PRM$JSE_Badging_Will_Expire 14 PRM$JSE_Invalid_Sentinel 15 PRM$JSE_Unknown_Panel 16 PRM$JSE_NTEventLogError 17 PRM$JSE_Asset_Tracking_Will_Expire 18 PRM$JSE_Asset_Tracking_Expired 19 PRM$JSE_Paging_Will_Expire 20 PRM$JSE_Paging_Expired API Code int_data4 eTrust Audit Field Mapping 47 eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 009 – Device Activity (Normal) eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” General “SubCat” System “Status” S “State” Normal “Severity” Info “User” User_PID Operation “Oper” See Message Code List 1 “ObjClass” SysActivity “ObjName” ActivityCode Native “OID” Int_Data3 Native ID “NID” MsgCode Secondary “SObjClass” Unit Secondary “SObjName UnitID Secondary “SObjID” Int_Data1 “Another ObjectID” Int_Data2 Info Device Activity (Normal) 48 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 1 Message Code List 1 Oper 1 PRM$JDM_Memory_Erased Memory 2 PRM$JDM_Hardware_Reset Reset 3 PRM$JDM_Power_Recycle Recycle 4 PRM$JDM_Download_Started Download 5 PRM$JDM_Download_Completed Download 6 PRM$JDM_Host_Init_Connection_Started Init 7 PRM$JDM_Host_Init_Connection_Completed Init 8 PRM$JDM_Panel_Init_Connection_Started 9 PRM$JDM_Panel_Init_Connection_Completed 10 PRM$JDM_Flash_Started Flash 11 PRM$JDM_Flash_Completed Flash 12 PRM$JDM_Email_Sent Email 13 PRM$JDM_Page_Sent Page 14 PRM$JDM_Grace_All Grace 15 PRM$JDM_Grace_Card Grace 16 PRM$JDM_Download_UnitIsFull Download 17 PRM$JDM_iStar_Dialup_Connected Dialup 18 PRM$JDM_iStar_Dialup_Started Dialup 19 PRM$JDM_RAD_BUSY_SECOND 20 PRM$JDM_RAD_COMPUTER_ERROR 21 PRM$JDM_RAD_COMPUTER_RESTORED 22 PRM$JDM_RAD_PHONE_LINE_FAIL 23 PRM$JDM_RAD_PHONE_LINE_RESTORED 24 PRM$JDM_RAD_ACCOUNT_CLOSE 25 PRM$JDM_RAD_ACCOUNT_OPEN 26 PRM$JDM_RAD_UNKNOWN_MSG 27 PRM$JDM_RAD_CRC_ERROR 28 PRM$JDM_RAD_RECEIVER_NUM_WRONG eTrust Audit Field Mapping 49 eTrust Audit Normalized Fields Message Code List 1 29 PRM$JDM_RAD_ACCOUNT_CLOSE_ZN 30 PRM$JDM_RAD_ACCOUNT_OPEN_ZN 31 PRM$JDM_RAD_ACCOUNT_CLOSE_ID 32 PRM$JDM_RAD_ACCOUNT_OPEN_ID 33 PRM$JDM_RAD_ACCOUNT_CLOSE_AREA 34 PRM$JDM_RAD_ACCOUNT_OPEN_AREA 35 PRM$JDM_RAD_ACCOUNT_CLOSE_AREA_ID 36 PRM$JDM_RAD_ACCOUNT_OPEN_AREA_ID 37 PRM$JDM_RAD_ACCOUNT_UNKNOWN_MSG 38 PRM$JDM_RAD_ALARM 39 PRM$JDM_RAD_ALARM_RESTORE 40 PRM$JDM_RAD_ALARM_ZONE 41 PRM$JDM_RAD_ALARM_RESTORE_ZONE 42 PRM$JDM_RAD_ALARM_AREA 43 PRM$JDM_RAD_ALARM_RESTORE_AREA 44 PRM$JDM_RAD_LINE_CARD_TROUBLE 45 PRM$JDM_RAD_LINE_CARD_RESTORE 46 PRM$JDM_RAD_PRINTER_TROUBLE 47 PRM$JDM_RAD_PRINTER_RESTORE 48 PRM$JDM_RAD_ACCOUNT_DIAGNOSTIC 49 PRM$JDM_RAD_ACCOUNT_DIAGNOSTIC_ZONE 50 PRM$JDM_RAD_ACCOUNT_BATTERY_FAIL 51 PRM$JDM_RAD_ACCOUNT_BATTERY_RESTORE 52 PRM$JDM_RAD_ACCOUNT_AC_FAIL 53 PRM$JDM_RAD_ACCOUNT_AC_RESTORE 54 PRM$JDM_RAD_ACCOUNT_REBOOT 55 PRM$JDM_RAD_ACCOUNT_POINT_BUS_FAIL 56 PRM$JDM_RAD_ACCOUNT_POINT_BUS_RESTORE 57 PRM$JDM_RAD_ACCOUNT_SDI_FAIL 58 PRM$JDM_RAD_ACCOUNT_SDI_RESTORE 50 iRecorder Reference Guide for CCURE Oper eTrust Audit Normalized Fields Message Code List 1 Oper 59 PRM$JDM_RAD_FIRE_ALARM_POINT 60 PRM$JDM_RAD_FIRE_ALARM_RESTORE_POINT 61 PRM$JDM_RAD_FIRE_ALARM_AREA 62 PRM$JDM_RAD_FIRE_ALARM_RESTORE_AREA 63 PRM$JDM_RAD_ALARM_TROUBLE 64 PRM$JDM_RAD_ALARM_TROUBLE_POINT 65 PRM$JDM_RAD_ALARM_TROUBLE_AREA_POINT 66 PRM$JDM_RAD_FIRE_ALARM_TROUBLE 67 PRM$JDM_RAD_FIRE_ALARM_TROUBLE_POINT 68 PRM$JDM_RAD_FIRE_ALARM_TROUBLE_AREA_ POINT 69 PRM$JDM_RAD_PRINTER_TEST 70 PRM$JDM_RAD_PRINTER_ONLINE 71 PRM$JDM_RAD_PRINTER_OFFLINE 72 PRM$JDM_RAD_CANCEL_ALARM_ID 73 PRM$JDM_RAD_CANCEL_ALARM_AREA_ID 74 PRM$JDM_RAD_CANCEL_FIRE_ALARM_AREA_ID 75 PRM$JDM_WatchFlash_Download_Started 76 PRM$JDM_WatchFlash_Download_Completed 77 PRM$JDM_WatchFlash_Swapped 78 PRM$JDM_WatchFlash_Upload_Started 79 PRM$JDM_WatchFlash_Upload_Completed 80 PRM$JDM_Watch_Flash_Loading_Canceled 81 PRM$JDM_NetVideo_Server_Comm_Error 82 PRM$JDM_NetVideo_Server_Comm_Restored 83 PRM$JDM_NetVideo_Status_Retry 84 PRM$JDM_NetVideo_Pipe_Server_Timeout 85 PRM$JDM_NetVideo_Server_Error 86 PRM$JDM_NetVideo_Camera_Error 87 PRM$JDM_NetVideo_Action_Error eTrust Audit Field Mapping 51 eTrust Audit Normalized Fields Message Code List 1 88 PRM$JDM_NetVideo_Server_Comm_Success 89 PRM$JDM_BID_Receiver_JnlMsg 90 PRM$JDM_BID_Action_JnlMsg1 91 PRM$JDM_BID_Action_JnlMsg2 92 PRM$JDM_BID_Action_JnlMsg3 93 PRM$JDM_BID_Action_JnlMsg4 94 PRM$JDM_BID_Action_JnlMsg5 95 PRM$JDM_BID_Action_JnlMsg6 96 PRM$JDM_BID_Receiver_JnlMsg1 97 PRM$JDM_BID_Action_No_Command 98 PRM$JDM_BID_Action_Empty_Command 99 PRM$JDM_BID_Action_Set_Command_Err 101 PRM$JDM_BID_Action_Device_Comm_Err 102 PRM$JDM_Watch_Loading_Canceled 52 iRecorder Reference Guide for CCURE Oper eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 010 – Device Error/Recovery eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” General “SubCat” System “Status” F “State” Error “Severity” Critical Operation “Oper” UnitAccess “ObjClass” Error “ObjName” ErrorCode Native “OID” Int_Data3 Native ID “NID” MsgCode Secondary “SObjClass” Unit Secondary “SObjName UnitID Secondary “SObjID” Int_Data1 “Another ObjectID” Int_Data2 “SubErrorCode” Int_Data4 Info Info Message Code List 1 Message Code List 1 1 PRM$JDE_Download_Aborted 2 PRM$JDE_Buffer_Full 3 PRM$JDE_Wrong_Firmware 4 PRM$JDE_Sequence_Error 5 PRM$JDE_Encryption_Error 6 PRM$JDE_Unable_To_Contact_Panel 7 PRM$JDE_Unable_To_Contact_Host eTrust Audit Field Mapping 53 eTrust Audit Normalized Fields Message Code List 1 8 PRM$JDE_Host_Init_Connection_Failure 9 PRM$JDE_Panel_Init_Connection_Failure 10 PRM$JDE_Received_Call_Inuse_Panel 11 PRM$JDE_Manual_Connect_Failed 12 PRM$JDE_Password_Verification_Error 13 PRM$JDE_Panel_Reported_Password_Error 14 PRM$JDE_Panel_Reported_Modem_Error 15 PRM$JDE_Received_Call_Offline_Panel 16 PRM$JDE_Unable_To_Flash 17 PRM$JDE_Flash_Aborted 18 PRM$JDE_Flash_Too_Big 19 PRM$JDE_Flash_Error 20 PRM$JDE_Flash_Bad_Version 21 PRM$JDE_Unable_Cancel_Flash 22 PRM$JDE_No_Flash_Chip 23 PRM$JDE_Email_Failed 24 PRM$JDE_Page_Failed 25 PRM$JDE_Control_Zone_Violated 26 PRM$JDE_ControlZone_Secure_Failed 27 PRM$JDE_ControlZone_Access_Failed 28 PRM$JDE_Flash_CRC_Error 29 PRM$JDE_Flash_NoFlashMemory 30 PRM$JDE_Flash_NoDramMemory 31 PRM$JDE_Flash_FallbackImage 32 PRM$JDE_Event_Buffer_Full 33 PRM$JDE_Event_Buffer_HighWaterMark 34 PRM$JDE_Flash_NotRequestedFlashImage 35 PRM$JDE_iSTAR_Dialup_Disconnect 36 PRM$JDE_iSTAR_Dialup_Communication_failed 37 PRM$JDE_Need_KGI_Image 54 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Message Code List 1 38 PRM$JDE_WatchFlash_Download_Error 39 PRM$JDE_WatchFlash_Swap_Error 40 PRM$JDE_WatchFlash_Upload_Error 41 PRM$JDE_Watch_Loading_Error Field Mapping for CCure Event: Message Code 011 – Asset Activity eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” Asset “Status” S “State” Warning “Severity” Info “Asset” user_pid User int_data3 Operation “Oper” AssetActivity “ObjClass” AssetInfo “ObjName” AssetInfoCode Native “OID” Int_Data2 Native ID “NID” MsgCode Secondary “SObjClass” AssetAccess Secondary “SObjName AccessCode Secondary “SObjID” Int_Data4 Info Info eTrust Audit Field Mapping 55 eTrust Audit Normalized Fields Message Code List 1 Message Code List 1 1 PRM$JAT_Overdue 2 PRM$JAT_Checkout 3 PRM$JAT_Checkin Field Mapping for CCure Event: Message Code 012 – Asset Movement Authorized eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” Asset “Status” S “State” Normal “Severity” Info “Asset” user_pid “User” int_data3 Operation “Oper” AssetMove “ObjClass” AssetInfo “ObjName” HHRID Native “OID” Int_Data2 Native ID “NID” MsgCode Secondary “SObjClass” AssetAccess Secondary “SObjName AccessCode Secondary “SObjID” Int_Data4 “ReaderID” Int_Data1 “Tag Number” Txt_Data1 “AreaID” Txt_Data2 Info Info Field Mapping for CCure Event: Message Code 013 – Asset Movement Unauthorized 56 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” Asset “Status” F “State” Reject “Severity” Warning “Asset” user_pid “User” int_data3 Operation “Oper” AssetMove “ObjClass” AssetInfo “ObjName” HHRID Native “OID” Int_Data2 Native ID “NID” MsgCode Secondary “SObjClass” AssetAccess Secondary “SObjName AccessCode Secondary “SObjID” Int_Data4 “ReaderID” Int_Data1 “Tag Number” Txt_Data1 “AreaID” Txt_Data2 Info Info eTrust Audit Field Mapping 57 eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 014 – Asset Movement Attempted eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” Asset “Status” F “State” Reject “Severity” Warning “Asset” user_pid “User” int_data3 Operation “Oper” AssetMove Native ID “NID” MsgCode Secondary “SObjClass” AssetAccess Secondary “SObjName AccessCode Secondary “SObjID” Int_Data4 “ReaderID” Int_Data1 “Tag Number” Txt_Data1 “AreaID” Txt_Data2 Info Info 58 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 015 – Asset Location Update eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” Asset “Status” S “State” Normal “Severity” Info “Asset” user_pid “User” int_data3 Operation “Oper” AssetMove “ObjClass” AssetInfo “ObjName” HHRID Native “OID” Int_Data2 Native ID “NID” MsgCode Secondary “SObjClass” AssetAccess Secondary “SObjName AccessCode Secondary “SObjID” Int_Data4 “Tag Number” Txt_Data1 “AreaID” Txt_Data2 Info Info eTrust Audit Field Mapping 59 eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 016 – Watchtour Action eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” WatchTour “Status” S “State” Normal “Severity” Info “User” user_pid Operation “Oper” WatchTourAction “ObjClass” WatchTourAction “ObjName” WatchTourActionCode Native “OID” Int_Data1 Native ID “NID” MsgCode Secondary “SObjClass” Object Secondary “SObjName ObjectID Secondary “SObjID” Int_Data2 “TourGaurdID” Int_Data3 Info Info 60 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 017 – Watchtour Activity eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” WatchTour “Status” S “State” Normal “Severity” Info Operation “Oper” WatchTourActivity “ObjClass” WatchTourInfo “ObjName” WatchTourInfoCode Native “OID” Int_Data1 Native ID “NID” MsgCode Secondary “SObjClass” Object Secondary “SObjName ObjectID Secondary “SObjID” Int_Data2 “ReaderID” Int_Data4 “TourGaurdID” Int_Data3 Info Info eTrust Audit Field Mapping 61 eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 018 – Watchtour Error eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” WatchTour “Status” F “State” Error “Severity” Warning Operation “Oper” WatchTourAction “ObjClass” WatchTourAction “ObjName” WatchTourActionCode Native “OID” Int_Data1 Native ID “NID” MsgCode Secondary “SObjClass” Object Secondary “SObjName ObjectID Secondary “SObjID” Int_Data2 “TourGaurdID” Int_Data3 Info Info 62 iRecorder Reference Guide for CCURE eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 019 – Watchtour Stop Activity eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” WatchTour “Status” S “State” Normal “Severity” Info Operation “Oper” WatchTourAction “ObjClass” WatchTourAction “ObjName” WatchTourActionCode Native “OID” Int_Data1 Native ID “NID” MsgCode Secondary “SObjClass” Object Secondary “SObjName ObjectID Secondary “SObjID” Int_Data2 “TourGaurdID” Int_Data3 Info Info eTrust Audit Field Mapping 63 eTrust Audit Normalized Fields Field Mapping for CCure Event: Message Code 020 – NetVideo Activity eTrust Audit Field Name CCure Event Field “Taxonomy” Not defined yet “Category” Physical Security “SubCat” NetVideo “Status” S “State” Normal “Severity” Info “User” User_PID Operation “Oper” NetVideoActivity “ObjClass” Camera “ObjName” CameraID Native “OID” Int_Data1 Native ID “NID” MsgCode Secondary “SObjClass” NetVideoAction Secondary “SObjName NetVideoActionID Secondary “SObjID” Int_Data2 “EventID” Int_Data4 Info Info 64 iRecorder Reference Guide for CCURE