Security Modifications Reports
To search for and generate a report for security modification activities on z/OS use the Security Modifications Real-Time Report.
Menu path:
In addition to setting the common report options in Preparing a Real-time Report, you can select optional filter operators in the generated report.
You can select to view various options in ascending or descending order. Choose the sort order by using the drop-down menu. The default is to display the Source Device, Record Type Description, Event Type, Action, Status, and Count.
For information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Device that sent these log messages |
Record Type ID | The ID of the record type |
Record Type Description | Description of the record type |
SubType Description | Description of the sub type |
Event Type | Type of event in the journal type |
Logon ID/User ID | A user ID or login ID involved in the recorded event |
Job Name | Name of the journal job or the job that was the target of the action described in the entry |
Target Object Name | Name of the object that was acted on |
Target Object Type | Type of target object that was acted on |
Action | Action taken |
Status | Status of the connection |
Count | A count of action attempts, entries, or other count information dependent on journal and entry type. |
Copyright © Cloud Software Group, Inc. All rights reserved.