Skip to main content
Skip table of contents

Common Criteria Audit Data Generation

LogRhythm Audit Data Generation was implemented to meet Common Criteria requirements to generate audit records of auditable events. The LogRhythm Audit Generation makes use of a SQL Server audit trace that is output by SQL Server in the form of trace files. These trace files contain the audit data. The SQL Server trace captures all required audit events and produces trace files (.trc) at a configurable location.


Required Scripts for Audit Data Generation

The following scripts are required to implement the audit settings. These scripts are available under Documentation & Downloads on the LogRhythm Community. Click the SIEM tab, select the downloads page for your release, and then scroll to the Common Criteria Audit Scripts section.

  • LogRhythm_Audit.sql. Creates a stored procedure in the master database called LogRhythm_Audit. When this stored procedure is executed the audit trace is defined, the audit events are defined, the audit filters are defined, and the audit trace is started.
  • LogRhythm_Audit_Select.sql. Creates a stored procedure preferably in the LogRhythmEMDB database that allows for filtered reporting on a trace file or set of trace files. The LogRhythm_Audit_Select stored procedure must reside in the LogRhythmEMDB on Platform Managers.

Audited Events

The LogRhythm_Audit stored procedure configures the audit trace to record events to the audit trace files. The table below enumerates all event types that can be monitored for and recorded in the audit trace. Those highlighted are enabled in the default configuration to provide the minimal level of auditing to comply with the Security Functional Requirements for Common Criteria. The trace can be altered to include other event types as well as filter on any of the reporting fields recorded in the audit trace.

14Audit LoginSecurity AuditIndicates that a user has successfully logged into SQL Server.
15Audit LogoutSecurity AuditIndicates that a user has logged out of SQL Server.
18Audit Server Starts And StopsSecurity AuditIndicates that the SQL Server service state has been modified.
20Audit Login FailedSecurity AuditIndicates that a user attempted to log in to SQL Server and failed.
82LogRhythm Defined : Data ModifiedSecurity AuditIndicates that data has been INSERTED, UPDATED, or DELETED from a LogRhythm database table
102Audit Database Scope GDR EventSecurity AuditIndicates that a GRANT, REVOKE, or DENY has been issued for a statement permission by a user in Microsoft SQL Server.
103Audit Schema Object GDR EventSecurity AuditIndicates that a GRANT, REVOKE, or DENY was issued for a schema object permission by a user in SQL Server.
104Audit Add login EventSecurity AuditIndicates that a login has been added or removed.
105Audit Login GDR EventSecurity AuditIndicates that a Microsoft Windows login right was added or removed.
106Audit Login Change Property EventSecurity AuditIndicates that sp_defaultdb, sp_defaultlanguage, or ALTER LOGIN was used to modify a property of a login.
107Audit Login Change Password EventSecurity AuditIndicates that a user has changed their SQL Server login password.
108Audit Add Login to Server Role EventSecurity AuditIndicates that a login was added or removed from a fixed server role.
109Audit Add DB User EventSecurity AuditIndicates that a login has been added or removed as a database user to a database.
110Audit Add Member to DB Role EventSecurity AuditIndicates that a login has been added to or removed from a role.
111Audit Add Role EventSecurity AuditIndicates that a database role was added to or removed from a database.
112Audit App Role Change Password EventSecurity AuditIndicates that a password has been changed for an application role.
113Audit Statement Permission EventSecurity AuditIndicates that statement permission has been used.
114Audit Schema Object Access Event ClassSecurity AuditIndicates that object permission (such as SELECT) has been used.
115Audit Backup/Restore EventSecurity AuditIndicates that a backup or restore statement has been issued.
116Audit DBCC EventSecurity AuditIndicates that a DBCC command has been issued.
117Audit Change Audit EventSecurity AuditIndicates that an audit trace modification has been made.
118Audit Object Derived Permission EventSecurity AuditIndicates that a CREATE, ALTER, or DROP was issued for an object.
128Audit Database Management EventSecurity AuditIndicates that a database has been created, altered, or dropped.
129Audit Database Object Management EventSecurity AuditIndicates that a CREATE, ALTER, or DROP statement was executed on a database object.
130Audit Database Principal Management EventSecurity AuditIndicates that principals have been created, altered, or dropped from a database.
131Audit Schema Object Management EventSecurity AuditIndicates that a server object has been created, altered, or dropped.
132Audit Server Principal Impersonation EventSecurity AuditIndicates that an impersonation has occurred within the server scope.
133Audit Database Principal Impersonation EventSecurity AuditIndicates that an impersonation has occurred within the database scope.
134Audit Server Object Take Ownership EventSecurity AuditIndicates that a server object owner has changed.
135Audit Database Object Take Ownership EventSecurity AuditIndicates that there has been a change of owner for objects in database scope.
152Audit Change Database OwnerSecurity AuditIndicates that the permissions to change the owner of a database have been checked.
153Audit Schema Object Take Ownership EventSecurity AuditIndicates that the permissions to change the owner of schema object have been checked.
154Audit Database Mirroring LoginSecurity AuditIndicates events to report audit messages related to database mirroring transport security
158Audit Broker Conversation EventSecurity AuditIndicates events to report audit messages related to Service Broker dialog security
159Audit Broker LoginSecurity AuditIndicates events to report audit messages related to Service Broker transport security
170Audit Server Scope GDR EventSecurity AuditIndicates that a GDR event has occurred for server permissions.
171Audit Server Object GDR EventSecurity AuditIndicates that a GDR event for a schema object has occurred.
172Audit Database Object GDR EventSecurity AuditAudit Database Object GDR Event Class
173Audit Server Operation EventSecurity AuditIndicates that Audit operations have occurred in the server.
175Audit Server Alter Trace EventSecurity AuditIndicates that the ALTER TRACE permission has been checked.
176Audit Server Object Management EventSecurity AuditIndicates that a CREATE, ALTER, or DROP event has occurred for a server object.
177Audit Server Principal Management EventSecurity AuditIndicates that a CREATE, ALTER, or DROP has occurred for a server principal.
178Audit Database Operation EventSecurity AuditIndicates that various operations such as Check Point or subscribe query notification have occurred.
180Audit Database Object Access Event ClassSecurity AuditIndicates that a database object, such as a schema, has been accessed.


Stored Procedures

The following triggers are built into the EMDB and are required to implement the audit settings.

  • LogRhythm_EMDB_Audit_Build_All_Tables_Triggers

    • This stored procedure builds all necessary triggers and shadow tables to set up the Enhanced Database Auditing functionality
    • Upon initial execution of this stored procedure, the contents of the following tables are evaluated to determine the audit policy to be used:
      • AuditTableExclusion - If any table names are defined in this table, the audit policy will be an inclusion by default (Blacklist) policy (default)
      • AuditTableInclusion - If any table names are defined in this table, the audit policy will be an exclusion by default (Whitelist) policy
        • This table takes precedent over AuditTableExclusion
        • If the same table name appears in both the AuditTableInclusion  and AuditTableExclusion tables, that table will be included in the audit policy
      • AuditLoginExclusion - Any database credentials present in the AuditLoginExclusion table in the LogRhythmEMDB database will not generate audit records
    • By default, if no records are added to any of the tables listed above, ALL tables in the LogRhythmEMDB will be audited using triggers and shadow tables set up by the stored procedure
    • By default, the LogRhythm service accounts are added to the AuditLoginExclusion table
      • This is to prevent service accounts that frequently authenticate from various component services from generating audit events
    • To use an exclusion by default (Whitelist) policy, prior to executing the stored procedure mentioned above, populate the AuditTableInclusion table in the LogRhythmEMDB database with table names to be audited
  • LogRhythm_EMDB_Audit_Drop_All_Tables_Trigger
    • This feature can be turned off and all data removed by running the stored procedure.
  • LogRhythm_EMDB_Audit_Table_Select
    • Allows a user to query raw audit data from a shadow table.
  • LogRhythm_EMDB_Audit_History
    • Allows a user to query a history of the row state at various points in time.



JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.