4.2.4 Security Violation Report
This topic provides information on security violation report of desktop security.
This program can be used to display or print the Violation Report. The report gives details of exceptional activities performed by a user during the day. The difference between the Violation Report and the Audit Trail is that the former gives details of all the activities performed by the users during the day, and the latter gives details of exceptional activities, for example, forced password change, unsuccessful logins, User already logged in, and so on. The details given include:
- Time
- The name of the operator
- The name of the function
- The ID of the terminal
- A message giving the reason for the login
The system gives the Security reports a numerical sequence. The Security Report includes the following messages:
- Sign-on Messages
This topic provides information on sign-on messages.
Parent topic: Oracle FLEXCUBE Investor Servicing Controls