IBM i provides a plethora of options when it comes to auditing security-related events on the server.
Many shy away from auditing because, from a cursory view, it takes up too much time, seems only to eat up disk space, and generates far more data than a normal human can digest.
But if we take a common sense approach to security auditing, it is possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
In this webinar, Jeff Uehling, Security Development, IBM i Operating System, IBM, discusses:
- The security auditing options on the IBM i server
- How to configure the audit of security-related events
- How to configure information related to the auditing of objects and users