DEFINITY Enterprise Communications Server Release 5
Maintenance and Test for R5vs/si
555-230-123
Issue 1
April 1997
Maintenance Commands and Trouble-Clearing Aids
Page 8-250monitor security-violations
8
monitor security-violations
This command provides an audit trail of security infractions
Synopsis
monitor security-violations
print
Permissions
The following default logins may execute this command: init, inads, system
technician, cust, rcust, bcms, browse.
Examples
monitor security-violations
monitor security-violations print
Description
The monitor security-violations command displays information about failed
attempts to access the system. The time of the violation, the login entered, and
the port accessed during the failed login attempt are logged. Also, the trunk
group number, member, and extension will be logged for remote access
violations. Remote and local invalid access attempts are logged with a total of 16
entries maintained for each access type. This on-line status report is
automatically updated every 30 seconds until the command is canceled by
pressing the CANCEL key.
Defaults
No defaults.
Parameters
Help Messages
If the system technician presses HELP after entering "monitor security-violations",
the following message is displayed:
[’print’]
print This will cause the report to be printed if a printer is linked to the SAT.