Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The Data Strategy report provides field level information on data strategies, such as the field group, field group owner, field group release level, database, field name, table name, precision, field type, field process type, reference code name, enrichment field, data category, and approvals.

You can filter the search results by data strategy.

To run the Data Strategy report:

  1. From the Reference Desk workspace, click Securities in the left navigation.
    You see the Securities workspace with all the available securities.
  2. Click the View By drop down and select Security.
  3. Complete the required search criteria and click the Search button.
    You see the search results based on the criteria you selected.
  4. Select the security and click Reports.
    You see the Reports dialog box.
  5. Click Data Strategy and click OK.
  6. Click the Search button to display the results.

...

The Release Status Detail report shows the current release status at the individual security level. Information includes the security alias, release status, issue name, issue description, ticker, primary asset identifier, investment type, security type, maturity date, processing security type, asset currency, issue identifier, effective date, inactive flag, number of errors, number of warnings, number of errors and warnings, update source, update date, source, pool number, update type, alternate asset identifier, number of attachments, data strategy, and gold copy.

You can filter the search results by security, release status level, investment type, currency, data strategy, and gold copy.

To run the Release Status Detail report:

  1. From the Reference Desk workspace, click Securities in the left navigation.
    You see the Securities workspace with all the available securities.
  2. Click the View By drop down and select Security.
  3. Complete the required search criteria and click the Search button.
    You see the search results based on the criteria you selected.
  4. Select the security and click Reports.
    You see the Reports dialog box.
  5. Click Release Status Detail Report and click OK.
  6. Complete the required search criteria and click the Search button to display the results.

...

The Release Status Summary report shows the current release status grouped by gold copy and data strategy. Information includes the gold copy, data strategy, release status level, and number of securities.

You can filter the search results by composite source, days to look back, and data strategy.

To run the Release Status Summary report: 1.    From

  1. From the Reference Desk workspace, click Securities in the left navigation.

...

  1. You see the Securities workspace with all the available securities.

...

  1. Click the View By drop down and select Security.

...

  1. Complete the required search criteria and click the Search button.

...

  1. You must specify an Effective Date. You see the search results based on the criteria you selected.

...

  1. Select the security and click Reports.

...

  1. You see the Reports dialog box.

...

  1. Click Release Status Summary Report and click OK.

...

  1. Complete the required search criteria and click the Search button to display the results.

Anchor
_Toc422746902
_Toc422746902
Security Audit Report

The Security Audit report shows all data changes. Information includes the source, security alias, ticker, primary asset identifier, investment type, issue name, security type, coupon, maturity date, processing security type, effective date, journal type, table name, column name, field name, new value, old value, master journal instance, last modified, action, and last updated by.

You can filter search results by journal instance, source, security, investment type, security type, processing security type, update user, journal type, update type, last hours, and field identifier.

To run the Security Audit report: 1.    From

  1. From the Reference Desk workspace, click Securities in the left navigation.

...

  1. You see the Securities workspace with all the available securities.

...

  1. Click the View By drop down and select Security.

...

  1. Complete the required search criteria and click the Search button.

...

  1. You must specify the Begin Date and End Date. You see the search results based on the criteria you selected.

...

  1. Select the security and click Reports.

...

  1. You see the Reports dialog box.

...

  1. Click Security Audit Report and click OK.

...

  1. Complete the required search criteria and click the Search button to display the results.

Anchor
_Toc422746903
_Toc422746903

...

The User Audit report shows the manual changes made to all securities and exceptions. Information includes audit type, action, security alias, user, date, issue name, investment type, processing security type, primary asset identifier, comments, start date, end date, old value, new value, source, and error code.

You can filter the search results by security, investment type, currency, and audit type. Options for audit type include authorize, auto expiration, edit xreference, no override, overlay (override), reject, release exception, security, and underlay (default).

To run the User Audit report: 1.    From

  1. From the Reference Desk workspace, click Securities in the left navigation.

...

  1. You see the Securities workspace with all the available securities.

...

  1. Click the View By drop down and select Security.

...

  1. Complete the required search criteria and click the Search button.

...

  1. You see the search results based on the criteria you selected.

...

  1. Select the security and click Reports.

...

  1. You see the Reports dialog box.

...

  1. Click User Audit Report and click OK.

...

  1. Complete the required search criteria and click the Search button to display the results.

...