How security traces work
Security traces allow you to configure a filter that detects client operations over SMB/CIFS and NFS on the storage virtual machine (SVM), and trace all access checks matching that filter. You can then view the trace results, which provides a convenient summary of the reason that access was allowed or denied.
When you want to verify the security settings for SMB/CIFS or NFS access on files and folders on your SVM or if you are faced with an access problem, you can quickly add a filter to turn on permission tracing.
The following list outlines important facts about how security traces works:
- ONTAP applies security traces at the SVM level.
 - Each incoming request is screened to see if it matches filtering criteria of any enabled security traces.
 - Traces are performed for both file and folder access requests.
 - Traces can filter based on the following criteria:
- Client IP
 - SMB/CIFS or NFS path
 - Windows name
 
 - Requests are screened for Allowed and Denied access response results.
 - Each request matching filtering criteria of enabled traces is recorded in the trace results log.
 - The storage administrator can configure a timeout on a filter to automatically disable it.
 - If a request matches multiple filters, the results from the filter with the highest index number is recorded.
 - The storage administrator can print results from the trace results log to determine why an access request was allowed or denied.
 
Give documentation feedback