Following is a sample of the RPTDS2 output.
03/29/02 DATASET VIOLATIONS BY VIOLATOR NAME PAGE 1
‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑
NAME SEVERITY DSN NUMBER
TYPE
‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑‑
JANE SMITH LOGGING SYS94128.T113126.RA000.CAENFCPF.R0000020 1
JANE SMITH LOGGING SYS94128.T113126.RA000.CAENFCPF.R0000021 1
JANE SMITH LOGGING SYS94128.T120519.RA000.HUNCH03.R0000024 1
JANE SMITH LOGGING SYS94128.T160329.RA000.ENF.R0000004 1
JANE SMITH LOGGING SYS94128.T203509.RA000.ENF9403.R0000002 1
JANE SMITH LOGGING SYS94128.T203509.RA000.ENF9403.R0000003 1
JANE SMITH LOGGING SYS94128.T203509.RA000.ENF9403.R0000005 1
‑‑‑‑‑‑‑‑‑‑
JANE SMITH LOGGING 38
‑‑‑‑‑‑‑‑‑‑
‑‑‑‑‑‑‑‑‑‑
JANE SMITH 38
‑‑‑‑‑‑‑‑‑‑
ARTHUR JONES LOGGING DEMO.PROD.CLIST 1
ARTHUR JONES LOGGING MCLDA01.ISPFPARM.CLIST 1
‑‑‑‑‑‑‑‑‑‑
ARTHUR JONES LOGGING 2
‑‑‑‑‑‑‑‑‑‑
‑‑‑‑‑‑‑‑‑‑
ARTHUR JONES 2
‑‑‑‑‑‑‑‑‑‑
DENNIS EDWARDS LOGGING 1
DENNIS EDWARDS LOGGING TSSDFO.MLPALIB 2
‑‑‑‑‑‑‑‑‑‑
DENNIS EDWARDS LOGGING 3
‑‑‑‑‑‑‑‑‑‑
‑‑‑‑‑‑‑‑‑‑
DENNIS EDWARDS 3
‑‑‑‑‑‑‑‑‑‑
MARY HAMMOND LOGGING QATNR.ACTSETUP.CLIST 2
‑‑‑‑‑‑‑‑‑‑
MARY HAMMOND LOGGING 2
‑‑‑‑‑‑‑‑‑‑
‑‑‑‑‑‑‑‑‑‑
MARY HAMMOND 2
‑‑‑‑‑‑‑‑‑‑
ELIZABETH AMES VIOLATION TSS.KO43 2
ELIZABETH AMES VIOLATION TSS.KO43.VFIXES 2
‑‑‑‑‑‑‑‑‑‑
ELIZABETH AMES VIOLATION 4
‑‑‑‑‑‑‑‑‑‑
‑‑‑‑‑‑‑‑‑‑
ELIZABETH AMES 4
‑‑‑‑‑‑‑‑‑‑
‑‑‑‑‑‑‑‑‑‑
GRAND TOTAL 284
‑‑‑‑‑‑‑‑‑‑
1 REPORT RECORDS READ LINES PRINTED
1 284 299
‑**** REPORT PHASE ENDED 0.80 SECONDS.
In comparison to the RPTDS report, this report is a summary. You can use this report to get a brief look at the number of violations incurred by a user. If you find anything that looks suspicious, you can run a more detailed report, such as RPTDS on the user in question.
|
Copyright © 2007 CA Technologies.
All rights reserved.
|
|