Analyze
IMAGE log files, modify databases, create audit trails
and monitor database security
Each action that modifies the IMAGE/SQL database is recorded (logged) to
the logfile. These
actions are separately identifiable, relating to specific DBOPENs,
and can be analyzed and reported by DBAudit.
The DBAudit
utility allows database administrators to read IMAGE logfiles
to analyze database modifications. Various detail or summary
reports provide a wealth of data relating to the database
accessors and modifications. Some columns of most reports
include: database, dataset, device (where the database
is accessed), logon MPE user and account, program name,
group and account, IMAGE intrinsic type, item name and
contents, etc. DBAudit provides an easy method for generating
database transaction analysis reports.
Key
Benefits
- Audit
database programs and control changes...
DBAudit fulfills auditors' needs for reports which track database activity
by individual user and/or application program.
- SELECT
by numerous criteria...
Easily obtains information regarding
specific database modification through a variety
of selection criteria, even from massive logfiles,
and even if the data no longer exists in the database.
- Solve
specific database modification mysteries...
When a problem is found in the database
with regard to data values in a particular field,
DBAudit allows highly specific playback of the
responsible transaction by particular field value.
- System
crash database recovery...
Pinpoints the logical
status of the transaction and facilitates recovery. Status
reports (epilog) show the database status at the time of
the system abort.
|