Getting Started with IBM i Security: Event Auditing

On-Demand Webinar

Getting Started with IBM i Security: Event Auditing

Learn why event auditing is necessary and how to configure it
IBM i

 

Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2018 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.

In this fast-paced webinar series, leading experts Robin Tatam, Carol Woodbury, and Sandi Moore share insight into critical areas of IBM i security.

This second session of the series introduces event auditing, with Robin Tatam covering the basics and more:

  • Why auditing is necessary
  • Determine if IBM i auditing is currently active
  • How to configure auditing with one simple command
  • What audit events are recorded (and which are missed!)
  • How high availability (HA) applications often make critical events disappear
  • Event reporting and real-time alerting
Get Started

Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.