This powerful audit tool can track individual users all the way down to the field level, providing unparalleled visibility into file-level activity.
Monitor and enforce your system's security configuration. Includes security configuration scanning and optional live reporting.
DECADES OF IBM i OS SECURITY EXPERTISE
Read the Security Tips blog
Anything that you can do to discourage unwanted access to your IBM i system is a good idea. So, when I heard about Port Restrictions, I immediately thought that it would be a great idea to just shut down all the unused ports on our test box.