The Investigator displays the following searchable miscellaneous administration event records. For example, for CA Top Secret you can see a record based on an ADDTO command for a Field Descriptor Table (FDT) ACID. For CA ACF2, you can see a record for a DELETE command for Infostorage records, except against user profile and resource or database rules.
Includes a record for each time a miscellaneous entity is modified. This record is only generated for entities which are not objects, user accounts, or policies.
Event Code: 51
Includes a record for each time a user tries to modify a miscellaneous entity but is denied. This record is generated only for entities which are not objects, user accounts, or policies.
Event Code: 52
Note: For a comprehensive list of security events and the event triggers, see the security events chapter in your external security manager documentation.
Example: Identify why a new user has access to an RDT in CA Top Secret
All new employees are given limited security system access until they complete mandatory training. One of your new administrators tells you that they were allowed to change the resource descriptor table (RDT). The RDT is a reserved ACID that contains predefined resources classes, such as VOLUME, DATASET, and TERMINAL, and user-defined resource classes. You want to know who gave the new employee this level of access, when, and why. If the company protocol remains the same as you understand, this access must be revoked, but you want to research the details first.
All successful events appear. Use the actions pane to drill further into each record to determine who granted the access and when.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|