Built-in reports for IMS

IMS Checkpoint Results
This is not a report you would use for auditing. This IMS S-TAP report is used internally to track information. You cannot modify or clone this report.
IMS Access
This report provides an overview of access (a profile) within the default 1 hour reporting periods. Note that you should change the runtime parameter of DB Protocol and/or Server Type to narrow results to IMS.
IMS Data Access Details
Uses the full SQL Entity as the main entity and provides full details of each access to IMS.
Tip: When you clone this report, optionally add the DB Protocol attribute from Client/Server as a query condition to avoid mixing this report with other information that may be sent to this appliance.
IMS Event
A good report for summarizing the type of access (such as DLI), the psb_name, and the command and object mapping.
Tip: When you clone the IMS Event report, remove DB User Name from both the column and query condition and replace it with the IMS/DATA SET User ID attribute under the Full SQL entity. In addition, add the Full SQL ID as the last column of the report so you use it for sorting and more clearly see a sequence of events for forensics, as the regular timestamp may not provide enough precision.

You can modify the column names to be more reflective of the content, such as changing Application User to PSB Name.

IMS Object
This report provides an object-level view of access.
Tip: When you clone this report, make the following modifications:
  • Remove DB User Name from both the column and query condition and replace it with the IMS/DATA SET User ID attribute under the Full SQL entity.
  • Remove the Object Type field as well, as this is not populated.
  • Add the Full SQL ID as a column as the last column of the report to more clearly see a sequence of events for forensics