We noticed that for a VSESLIB we were being given access even though the resource was not defined in CA Topsecret. After listing the Resource Definition Table (RDT), we found that DEFPROT was not on on this resource class. We would like to enable DEFPROT on some of our resource classes. Before we do this, we would like to see if there are any undefined resources being accessed on the system.
Is there any way to run a report in CA Topsecret to identify undefined resources being accessed on the system, or not, since the resource wouldn't be defined to CA Topsecret ?
There is no such report, but client can create their own, with some work.
Steps to do this would be :
Have CA Topsecret log every access to the audit file and not just security violations.
Issue multiple WHOOWNS commands to see what is defined to CA Topsecret and write it to a dataset.
Run a TSSUTIL EXTRACT to build a dataset with all the audit entries.
Then create a user written report program to look at the WHOOWNS dataset and check each audit entry to see if the resource is defined to CA Topsecret, then write out only those resources that are not defined to CA Topsecret.
They need to consider if the overhead of logging all access to the audit file is worth it to them.