On the Monitoring submenu, enter the program names, transaction codes, or terminal names and the user ID option for whom the entry will be monitored. Then select the Replace option using s, and press Enter. The Protection Options screen displays.
Specify the following options on the previous screen. In the description of each option, the command syntax equivalent for each monitoring option is specified in parentheses.
Permits a specified section of program code to do the following:
Specify the beginning and ending program addresses or program offsets. Specify addresses as six- to eight-hexadecimal digits, and offsets as one- to five-hexadecimal digits.
If you specify .ANY in the From field and an address or offset in the To field, CA InterTest for CICS suspends monitoring when any BALR, BASSM, or BASR 14,15 or 14,14 instruction passes control to the specified location. Monitoring resumes when the routine executed by the instruction returns control to the next byte after the instruction.
At a breakpoint, specify * in the From field and leave the To field blank to instruct CA InterTest for CICS to bypass the current instruction.
Permits a program to modify areas in the CSA. Specify the offset and the length in hexadecimal.
Permits a program to modify areas in the CWA. Specify the offset and the length in hexadecimal.
Permits a program to modify a designated area of storage. Specify the beginning address as six to eight hexadecimal digits. Specify the length of the area in hexadecimal.
Permits a program to modify a load module.
Prevents a program from modifying a designated area of storage not protected by CA InterTest for CICS. Specify the beginning address as six- to eight-hexadecimal digits. Specify the length of the area in hexadecimal.
Specifies that the program be monitored and that the protection options, if specified, take effect only when the program executes at the current terminal (*), a specific terminal (termid), or without a terminal (.NO).
Specifies that the program be monitored and that protection options, if specified, take effect only when the program is executed by any user (.ANY), or a specific user (a CICS user ID).
Once you have specified the required information, press Enter. You return to the monitoring submenu where you selected the Protect option.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|