Previous Topic: When Does CA ACF2 for z/VM Create SMF Records?Next Topic: Utility Programs


Report Generators

You should carefully scan the CA ACF2 for z/VM reports to ensure that your computer system remains secure. (Look for a mistake in the specification of an access rule, or an attempt to guess the password of an authorized user, and so on.) These reports produce information that highlights these events, but someone must be looking at the reports to take appropriate action.

Also, you can limit the output of a particular report according to the privileges and restrictions of the specific logonid that is running the report. See the Reports and Utilities Guide for a more detailed explanation of this option.

CA ACF2 for z/VM reports format and edit information from SMF records and CA ACF2 for z/VM databases to perform these tasks:

You can read more about the CA ACF2 for z/VM reports and sample report output in the Reports and Utilities Guide. Besides these reports, CA Earl™ is shipped with CA ACF2 for z/VM. You can find complete details for using CA Earl™ in the Reporting with CA Earl™ Guide.