Previous Topic: Violation ThresholdsNext Topic: TSO Versus TSO/E


Auditing Options

Auditing of all defined users and ownable resources is accomplished using CA Top Secret logging and auditing mechanisms.

Examples: auditing options

This example adds the AUDIT attribute to the ACID for defined users:

TSS ADDTO(USER05) AUDIT

This example adds the resource name or prefix to the AUDIT record for ownable resources (APPLICATION, PSB, DBD, and Terminal):

TSS ADDTO(AUDIT) APPLICATION(TSTPAY)