Getting Started with IBM i Security: Event Auditing

On-Demand Webinar

Getting Started with IBM i Security: Event Auditing

Learn why event auditing is necessary and how to configure it


Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2017 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.

In this fast-paced webinar series, leading experts Robin Tatam, Carol Woodbury, and Sandi Moore share insight into critical areas of IBM i security.

This second session of the series introduces event auditing, with Robin Tatam covering the basics and more:

  • Why auditing is necessary
  • Determine if IBM i auditing is currently active
  • How to configure auditing with one simple command
  • What audit events are recorded (and which are missed!)
  • How high availability (HA) applications often make critical events disappear
  • Event reporting and real-time alerting
Get Started

Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.