Section 3 - 18
SENTRY User’s Guide
Fitzgerald & Long
Pathname
- This is the pathname to the account containing the protected VOC item which was used by
an unauthorized user.
Violation Item
- This field provides documentation on which Command was used. Messages beginning
with "Command Executed" indicate that the command was used within a paragraph, sentence or program.
Messages beginning with "PERFORM Command" indicate that use of the Protected Command occurred at
the database prompt.
In addition to the standard SENTRY reports, we encourage you to use the database reporting language to
create custom reports or to perform inquiries (e.g. LIST SENTRY.VIOLATIONS WITH DATE AFTER
"01/01/95" AND WITH COMMAND LIKE "...PAYROLL..." to show all violations related to the
PAYROLL file). Because all of the data is stored in an integrated database, there is great flexibility and
power available for reporting and research.
Summary of Contents for Sentry
Page 4: ......
Page 18: ......
Page 21: ...SENTRY User s Guide Section 1 3 Fitzgerald Long ...
Page 29: ...SENTRY User s Guide Section 1 11 Fitzgerald Long ...
Page 30: ......
Page 60: ...Section 2 30 SENTRY User s Guide Fitzgerald Long ...
Page 102: ......
Page 109: ...SENTRY User s Guide Appendix 1 7 Fitzgerald Long ...
Page 110: ......
Page 113: ...SENTRY User s Guide Appendix 2 3 Fitzgerald Long ...