HP Sentry User Manual

Page 108

Advertising
background image

Appendix 1 - 6

SENTRY User’s Guide



Fitzgerald & Long

Subroutine: SENTRY.VIOLATION.STAMP


SENTRY.VIOLATION.STAMP is used to log access violations of user items.

Sample :

SENTRY.VIOLATION.STAMP = "*SENTRY.VIOLATION.STAMP"


CALL @SENTRY.VIOLATION.STAMP(USER.ITEM, COMMENT)


Parameters:

USER.ITEM (Input)


The user-defined item for which the violation occurred. This reference was created through the SENTRY
User Item Maintenance screen.

COMMENT (Input)


Free format text description of the violation.

This is a routine similar to the one which logs violations to the SENTRY Violations Log when a user with
insufficient rights attempts to use a SENTRY protected command. It will create a new entry in the
SENTRY.VIOLATIONS.LOG file. The entry will then appear in the SENTRY violations report.

Advertising