Skip to main content

How security traces work

Security traces allow you to configure a filter that detects client operations over SMB/CIFS and NFS on the storage virtual machine (SVM), and trace all access checks matching that filter. You can then view the trace results, which provides a convenient summary of the reason that access was allowed or denied.

When you want to verify the security settings for SMB/CIFS or NFS access on files and folders on your SVM or if you are faced with an access problem, you can quickly add a filter to turn on permission tracing.

The following list outlines important facts about how security traces works:

  • ONTAP applies security traces at the SVM level.
  • Each incoming request is screened to see if it matches filtering criteria of any enabled security traces.
  • Traces are performed for both file and folder access requests.
  • Traces can filter based on the following criteria:
    • Client IP
    • SMB/CIFS or NFS path
    • Windows name
  • Requests are screened for Allowed and Denied access response results.
  • Each request matching filtering criteria of enabled traces is recorded in the trace results log.
  • The storage administrator can configure a timeout on a filter to automatically disable it.
  • If a request matches multiple filters, the results from the filter with the highest index number is recorded.
  • The storage administrator can print results from the trace results log to determine why an access request was allowed or denied.