HP (Hewlett-Packard) Sentry Printer User Manual


 
Appendix 1 - 6 SENTRY Users Guide
Fitzgerald & Long
Subroutine: SENTRY.VIOLATION.STAMP
SENTRY.VIOLATION.STAMP is used to log access violations of user items.
Sample :
SENTRY.VIOLATION.STAMP = "*SENTRY.VIOLATION.STAMP"
CALL @SENTRY.VIOLATION.STAMP(USER.ITEM, COMMENT)
Parameters:
USER.ITEM (Input)
The user-defined item for which the violation occurred. This reference was created through the SENTRY
User Item Maintenance screen.
COMMENT (Input)
Free format text description of the violation.
This is a routine similar to the one which logs violations to the SENTRY Violations Log when a user with
insufficient rights attempts to use a SENTRY protected command. It will create a new entry in the
SENTRY.VIOLATIONS.LOG file. The entry will then appear in the SENTRY violations report.