Справочник Пользователя для IBM Safenet/400

Скачать
Страница из 172
 
1.2
 
 SafeNet/400 
Reference 
Guide  
 
© Copyright 2008 MP Associates of Westchester, Inc. 
 
V8.50  - May 2008 
 
Setting the User Logging Levels 
 
 
The valid logging levels are: 
 
Logging Level A 
 
Log all transactions 
 
Logging Level R 
 
Log only rejected requests 
 
Logging Level N  
No 
logging 
 
 
As you set up your user logging levels, please keep in mind the following:   
 
 If you set the logging level on the Server Function (WRKSRV) to NO LOGGING or 
REJECTIONS, the Server Function (WRKSRV) setting will override the individual user 
logging level.   
 
 If you set the logging level on the Server Function to ALL, the individual user logging level 
will override the Server Function logging level.  
 
To make sure you are logging transactions correctly, we recommend that when you initially set 
up SafeNet/400 you set the Server Functions to log ALL and set the User to Server logging levels 
to either ALL or REJECTIONS
 
Then, after you have had some experience with checking the logs and interpreting the results, 
you may want to make changes for specific user and server combinations.   
 
An example of this might include certain "trusted" user profiles.  If you trust the user in question 
and are concerned about the size and amount of logging activity, you might choose to only 
record rejected transactions for that user.   
 
Another example might be a known client server application that is clearly defined and does not 
need to be monitored.  For these applications you might choose to stop logging altogether.  We 
have found several fax applications that fall into this category.  They generate a large number of 
entries that are really not needed for your purposes in controlling access security.