Duration
5 hours
Overview
These courses describe how CA ACF2™ is used to protect and secure the system against accidental and malicious access and damage. It instructs the student on how CA ACF2™ works and how to define users, rules and parameters, to restrict access to the system and its resources.
Audience
Auditors, systems programmers, security administrators, and other personnel requiring knowledge of the use of CA ACF2 (ACF2) Auditor on the z/OS platform
Prerequisites
Completion of the CA-ACF2 Introduction course and knowledge of TSO, ISPF, data sets, and basic security issues
Objectives
After completing this course, the student will be able to:
- Define auditing objectives
- Identify how to set audit controls for users, data sets, and resources
- Identify how to interpret audit and logging reports
Course Content
CA-ACF2 Auditing Functions
Auditing Objectives
ACF2 Audit Reports
Audit Privileges and Access Controls
CA-ACF2 Auditing Controls
Monitoring System and Data Set Access
Resource and Special Facilities Access
CA-ACF2 Auditing Report Parameters
JCL and Report Parameters
Passing Parameters to Audit Reports
CA-ACF2 Auditing Reports
Using ISPF Screens to Produce Reports
ACF2 Logging and Violation Reports