IBM z/OS Activity
To search for and generate reports on information about IBM z/OS system generated operational and audit logs in binary format, use IBM z/OS Activity reports.
The Report Information tab that appears when you click on
lists which reports are available for each log source.Choose
from the navigation menu, where report-name is one of:Report | Reports Provide | More information |
---|---|---|
Resource Access | Use the Resource Access screen to generate a report for resource access on z/OS. | Resource Access Reports |
Security Modifications | Use the Security Modification screen to generate a report for security modification on z/OS. | Security Modifications Reports |
System Access/Configuration | Use the System Access/ Configuration screen to generate a report for access and configuration on z/OS. | System Access/Configuration Reports |
Unix System Services | Use the Unix System Services screen to generate a report for Unix system services on z/OS. | Unix System Services Reports |
Login/Logout | Use the Login/Logout screen to generate a report for login and logout activities on z/OS. | Login/Logout Reports |
Violation | Use the Violation screen to generate a report for violation activities on z/OS. | Violation Reports |
Preparing a Real-time Report includes the common options that you specify for all Real-Time Reports.
Optional filter operators are different for each Event Logs report, and explained in their respective sections.
For information on saving the generated report, see Formats for Saving a Generated Report.
Copyright © Cloud Software Group, Inc. All rights reserved.