Help Center/ Cloud Bastion Host/ Getting Started/ Step 6: Audit O&M Sessions
Updated on 2024-11-12 GMT+08:00

Step 6: Audit O&M Sessions

Scenarios

You can log in to the managed resources with granted permissions through your bastion host for further O&M. You can also manage system configurations of your bastion host.

The CBH system makes it easier for the administrators to audit logins, operations on managed resources, and O&M sessions performed by other system users.

Procedure

Table 1 Description about the System and Audit modules

Audit Object

Audit Content

Live Session

Monitor on-going O&M sessions, view the session details of system users and resources, and interrupt sessions with high risks.

History Session

  • O&M session videos: The entire process of O&M sessions is automatically recorded by screencasting. You can play the screencasts online or download them.
  • O&M session details: O&M session details generated for different system users can be viewed online or exported as an Excel file. Session details include detailed operation records of resource sessions, system sessions, O&M records, file transfer, and collaboration sessions.

Operation Report

Display the trend of O&M operations over time in a line chart and generate a comprehensive O&M analysis report.

This area includes O&M time distribution, resource access times, session duration, number of access times from source IP addresses, session collaboration, two-person authorization, command interception, number of character commands, and number of transferred files.

System Log

  • System login logs: record detailed information about user login to the system. System login logs can be viewed online or exported as Excel files.
  • System operation logs: record detailed system operations. System operation logs can be viewed online or exported as an Excel file.

System Report

Collect statistics on user logins and system operations in a bar chart and generate a comprehensive system management analysis report.

This area includes information about user control, user and resource operations, number of user source IP addresses, user login mode, abnormal login, session control, and user status.