To analyse a data set, enter A on the line next to the entry.
CA Auditor invokes the CA Top Secret WHOHAS command which returns:
Important! The output may not reflect all possible allowed access situations. For example, ACID-based privileges such as NODSNCHK are not in the output. A security audit should separately audit high privileged users and other situations such as the use of Multi-Level Security (MLS) granting access, a ACID's SUSPEND status, and the use of SAF and CA Top Secret user exits.
For information on the CA Top Secret WHOHAS command, see the CA Top Secret Command Functions Guide.
| Copyright © 2009 CA. All rights reserved. | Tell Technical Publications how we can improve this information |