Time is short. As an administrator, you know that you should be looking at the security configuration of your system, reviewing reports on a regular basis, and performing specific tasks, but you don’t have the time to investigate exactly what that means.
During this webinar, Carol will provide a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i. Examples of what will be discussed include:
- Which system values should be reviewed for changes
- The audit journal entries that should be reviewed on a regular basis
- Best practice settings for user profile configuration (including group profiles and service accounts)
- Examples of using the security services in QSYS2 to make configuration review easier
With a comprehensive Risk Assessment, you'll see exactly where your system security needs improvement. Contact us today to start identifying your vulnerabilities.