Today I ran a DSPAUDJRNE ENTTYP(PW) USRPRF(*ALL) and while skimming over the results I noticed several entries similar to the following :
Violation Type : U
User Profile : ADMIN
Device Name : Communications Device
Remote Name :
Local Name :
Network ID :
Job Name : QZDASOINIT
Job User : QUSER
Job Number : 399141
Timestamp : 2006-09-19-03.39.04.647936
I know that QUSER/QZDASOINIT jobs are SQL connections, and there is no 'ADMIN' profile. But I am concerned by the frequency that this is occuring. Does anyone know if there is a way I can trace back the IP address the request originated from?
Free Guide: Managing storage for virtual environments
Complete a brief survey to get a complimentary 70-page whitepaper featuring the best methods and solutions for your virtual environment, as well as hypervisor-specific management advice from TechTarget experts. Don’t miss out on this exclusive content!