When making security audits, your major concern often is with security violations.
A LOGANALYZER SECURITY report consists of security-violation log records together with the time of day that the violation occurred and other information, such as the usercode and station name of the terminal where the violation originated. If a user attempted unauthorized access to a file, the audit report includes the name of that file. This information is intended to enable you to identify the violator and to indicate the nature of the attempted violation. See “Example of a SECURITY Report” earlier in this section for an example of a LOGANALYZER SECURITY report.
A list of security-violation records and suggested responses appears at the end of this section.

