Archives of the TeradataForum
Message Posted: Thu, 04 Mar 2004 @ 12:50:05 GMT
This approach will work in general but sometimes user IP addresses are "anonymized" by third party software such as firewalls, proxy servers etc. I think access auditing should extend to those systems as well and TD administrators should be able to view the logs produced by them. That might imply some interdepartmental (mis)communication, though.
|Copyright 2016 - All Rights Reserved|
|Last Modified: 23 Jun 2019|