Live Webinar

Security Best Practices for the IBM i Administrator

IBM i

Time is short. As an administrator, you know that you should be looking at the security configuration of your system, reviewing reports on a regular basis, and performing specific tasks, but you don’t have the time to investigate exactly what that means.

During this webinar, Carol will provide a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i. Examples of what will be discussed include:

  • Which system values should be reviewed for changes
  • The audit journal entries that should be reviewed on a regular basis
  • Best practice settings for user profile configuration (including group profiles and service accounts)
  • Examples of using the security services in QSYS2 to make configuration review easier
Offsite Registration
 
Webinar data loading »
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Jan
28
1580227200 Tuesday
January 28, 2020

10:00am to 1580230800 11:00am
Free
1 hour