Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
UA—user auditing z/OS ISPF User's Guide Vol II SC19-3628-00 |
|
The UA (user auditing) line command can be entered against any directory entry. This line command causes the Modify z/OS® UNIX File User Audit Options panel to be displayed. Figure 1. Modify z/OS UNIX File
User Audit Options panel (ISRUULUA)
The Pathname field displays the path name of the selected file. The Type field display the file type for the selected file. The user auditing options for the file can be changed by a superuser or the owner. These options allow you to define the access attempts that are audited by the security system. You can specify auditing to occur for read, write, and search or execute attempts on the file or directory. The panel displays fields for specifying the Read, Write and Execute
(or search) audit settings. For each of these fields, you enter one
of the listed numbers corresponding to one of these results for the
access attempt:
|
Copyright IBM Corporation 1990, 2014
|