Resources & Events
“Black Hole” Explorer
While the command auditing process is easy to activate, the forensics of reporting on those actions is not. There can be hundreds of related entries in the audit journal and these have to be identified and parsed—a task that often requires custom code to be written and maintained.
Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.