Safeguard Audit Service Manual (G06.29+, H06.08+, J06.03+)
SAFEART Field Descriptions
Safeguard Audit Service Manual — 520480-031
7 - 11
Secondary Record Fields
\###.$NAME[,CPU,PIN][:VERIFIER]
\###.CPU,PIN[:VERIFIER]
where ### is the system node number.
Secondary Record Fields
Some audited events might include one or more secondary records. Secondary
records provide additional information about an event. The additional information is
recorded in the text area of the secondary record, which is described in the following
pages. In addition to the text area, secondary records contain the six fields described
in Table 7-2. As noted, you cannot use some of these fields in SET WHERE
commands.
Depending on the type of operation involved, more than one secondary record might
be associated with an event. For example, if you attempt to change a disk-file
protection record, the audited event contains two secondary records. One secondary
record contains a representation of the disk-file protection record before the change,
Table 7-2. Secondary Record Fields
Field Name Field Type Description
SecondaryAuditnumber Numeric Identifies the audited event. The secondary
record is linke
d to the primary record with a
matching Auditnumber. You cannot use this field
in SET WHERE commands.
SecondaryRecordType Enumerated Describes the type of record. Possible values
app
ear in Table
7-8 on page 7-63.
SecondaryTextAreaType Enumerated Identifies the type of structure that appears in the
text area
immediately following this field.
Possible values appear in Table
7-9 on
page 7-63.
SecondaryTimeReceived Date and
time
Specifies the date and time when the event
description
was received by the audit service
collector process. You cannot use this field in
SET WHERE commands.
SecondaryTimeReported Date and
time
Specifies the date and time when the client or
su
bsystem sent the event description to the audit
service collector process. You cannot use this
field in SET WHERE commands.
SecondaryVeracity Enumerated Specifies the level of trust that can be placed on
the co
ntents of this record. This level depends on
the source of the audit request, trusted or
untrusted, and the errors or lack of errors in the
audit request itself. Possible values appear in
Table
7-10 on page 7-69.