Using the System Integrity Violation scanner
By using the SIV scanner to monitor SVCs, you can watch for unexpected SVC intercepts. While SVC intercepts are a part of normal operations for many products, unexpected SVC intercepts can be difficult to detect manually with 255 SVCs to watch.
The SIV scanner runs at the following times:
- Whenever there is an address space startup
- Every day at midnight
- When it is notified of SAF security system (RACF, ACF/2, CA Top Secret) changes
Whenever there are SAF changes, all address spaces that have registered interest in these changes are notified through the z/OS Event Notification Facility (ENF) function 79.
Enabling the SIV scanner
The SIV scanner is disabled by default.
To enable the SIV scanner
- Open $$$CONFG member.
Delete the semicolon preceding SWITCH ON(SIV) to uncomment the option.
; SWITCH ON(SIV) ; System Integrity Violation Scanner
This enables the OPTIONS statement parameter, SIVSCANNER, which enables the SIV scanner. For more information, see OPTIONS-statement.
Running the SIV scanner manually
To run the SIV scanner manually, issue the following MODIFY command to the BMC AMI Datastream for z/OS address space.
F czagentName,$ZINTEG,SCAN
For more information, see "MODIFY command for System Integrity Violation (SIV) scanner" in the MODIFY-command topic.