The IBM i operating system doesn't rely heavily on configuration files like most servers. However, there are aspects of the configuration that must be monitored and protected against inadvertent or unauthorized changes.
In addition, users often have untraceable access to application data through network interfaces like ODBC and FTP, and through system tools like DFU. Maintaining database integrity can be an overwhelming task, with users trying to identify unauthorized activities in a timely manner.
Watch this session to learn the critical aspects of file integrity monitoring and how it applies to IBM i, including:
- What IBM has done to help
- OS changes and how to detect them
- Baseline validation vs. real-time monitoring
- The challenge with journaling
- Real-time detection
Transcript not available at this time.