Skip to main content
NetApp Stage KB

Security trace shows the wrong user attempting to write files

Last Updated:


Applies to

  • ONTAP 9
  • Security Trace (sectrace)
  • Microsoft Windows


  • Users are unable to write files
    • sectrace command filtered to the client in question shows file access from a completely different (but valid) user. 
    • Cluster1::> vserver security trace filter create -vserver svm1 -index 2 -protocols cifs -client-ip
    • Cluster1::> vserver security trace filter trace-result show
    • Vserver: svm1
      Node            Index Filter Details             Reason
      --------------- ----- -------------------------- ------------------------------
      Cluster1-01     2     Security Style: UNIX       Access is denied by UNIX
                            permissions                permissions while creating
                                                       the directory. Access is not
                                                       granted for: "Synchronize",
                                                       "Read Control", "Read
                                                       Attributes", "Execute", "Read
                                                       EA", "Append", "Read"
                            Protocol: cifs
                            Volume: -
                            Share: share_data
                            Path: /project/user1/
                            New folder (2)
                            Win-User: ntap\system_user

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.