IBM Safenet/400 Network Card User Manual


 
1.2
SafeNet/400 Reference Guide
Copyright 2008 MP Associates of Westchester, Inc.
V8.50 - May 2008
Setting the User Logging Levels
The valid logging levels are:
Logging Level A Log all transactions
Logging Level R Log only rejected requests
Logging Level N No logging
As you set up your user logging levels, please keep in mind the following:
If you set the logging level on the Server Function (WRKSRV) to NO LOGGING or
REJECTIONS, the Server Function (WRKSRV) setting will override the individual user
logging level.
If you set the logging level on the Server Function to ALL, the individual user logging level
will override the Server Function logging level.
To make sure you are logging transactions correctly, we recommend that when you initially set
up SafeNet/400 you set the Server Functions to log ALL and set the User to Server logging levels
to either ALL or REJECTIONS.
Then, after you have had some experience with checking the logs and interpreting the results,
you may want to make changes for specific user and server combinations.
An example of this might include certain "trusted" user profiles. If you trust the user in question
and are concerned about the size and amount of logging activity, you might choose to only
record rejected transactions for that user.
Another example might be a known client server application that is clearly defined and does not
need to be monitored. For these applications you might choose to stop logging altogether. We
have found several fax applications that fall into this category. They generate a large number of
entries that are really not needed for your purposes in controlling access security.