Security Modifications Reports

To search for and generate a report for security modification activities on z/OS use the Security Modifications Real-Time Report.

Menu path: Reports > IBM z/OS Activity > Security Modifications

In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.

You can select to view various options in ascending or descending order. Choose the sort order by using the list. The default is to display the Source Device, Record Type Description, Event Type, Action, Status, and Count.

For information on saving the generated report, see Formats for Saving a Generated Report.

Security Modifications Report - Optional Filter Operators
Option Description
Source Device Device that sent these log messages
Record Type ID The ID of the record type
Record Type Description Description of the record type
SubType Description Description of the sub type
Event Type Type of event in the journal type
Logon ID/User ID A user ID or login ID involved in the recorded event
Job Name Name of the journal job or the job that was the target of the action described in the entry
Target Object Name Name of the object that was acted on
Target Object Type Type of target object that was acted on
Action Action taken
Status Status of the connection
Count A count of action attempts, entries, or other count information dependent on journal and entry type.