HP SENTRY Manual de usuario Pagina 108

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 113
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 107
Appendix 1 - 6 SENTRY Users Guide
Fitzgerald & Long
Subroutine: SENTRY.VIOLATION.STAMP
SENTRY.VIOLATION.STAMP is used to log access violations of user items.
Sample :
SENTRY.VIOLATION.STAMP = "*SENTRY.VIOLATION.STAMP"
CALL @SENTRY.VIOLATION.STAMP(USER.ITEM, COMMENT)
Parameters:
USER.ITEM (Input)
The user-defined item for which the violation occurred. This reference was created through the SENTRY
User Item Maintenance screen.
COMMENT (Input)
Free format text description of the violation.
This is a routine similar to the one which logs violations to the SENTRY Violations Log when a user with
insufficient rights attempts to use a SENTRY protected command. It will create a new entry in the
SENTRY.VIOLATIONS.LOG file. The entry will then appear in the SENTRY violations report.
Vista de pagina 107

Comentarios a estos manuales

Sin comentarios