System monitoring is an essential component of IT security because it helps keep track of the performance and availability of IT infrastructure, as well as detect and troubleshoot issues that may affect the security of the network and applications. Monitoring is often required by IT security, insurance and regulatory frameworks.
With data collected from security journal, history logs, message queues and system values iEventMonitor provides simple and powerful monitoring of all aspects of the IBM i operating system. Use this data to configure alerts with sophisticated routing and escalation rules. Alerts are sent to email, SIEM feeds and SMS. When the optional web portal is installed, alerts are sent with a link to respond the messages remotely.
|Device watch||Alert when a specified device is not in a usable state|
|Database file monitor||Watch IBM i database files for selected events like record adds, changes, deletes and more|
|Job Queue Watch||Job queue exceeds a configurable threshold|
|Job Name Watch||Monitor job start and end events|
|Output Queue Watch||Alert when unprocessed spool files exceed a user defined threshold|
|ASP% Disc Space Watch||Periodically checks ASP % and send alert when it changes by a configurable rate|
|Lock-Wait Watch||Watch for Lock Wait status (LCKW) for a specified job and user profile according to a configurable interval|
|Mutex-Wait Watch||Watch for Mutex Wait status (MTXW) for a specified job and user profile according to a configurable interval|
|Thread-Wait Watch||Watch for Thread Wait status (THDW) for a specified job and user profile according to a configurable interval|
|System Utilization Monitor||Monitor CPU utilization for interactive subsystems|
|Connection Watch||Periodically test connection to specified remote system. Includes optional exit program for full customization and automation.|
|Network Location Watch||A configurable network location is not working or is reporting lost packets or other interuptions|
|System Security Audit Monitor||
Track security journals and system values:
AD - Auditing changes
AF -Authority failures
AX - Row/Column Access
CD - Command line use
CP - User profile changes
DO - Deleted objects
DS - DST password reset
EV - Environment variables
OW - Obj Ownership changes
PS - Profile swaps
PW - Invalid passwords
SK - Secure socket connections
SO - Security actions
ST - Service tools use
SV - System value changes
|Digital Certificate Expiration||An installed certificate in DCM will expire within a configurable timeframe|
|User Profile Activity Watch||Track user profile activity in interactive sessions|
|User Profile Expiration Watch||A user profile will expire withing a configurable timeframe|
|Message Queue Monitor||Configure a watch for any message queue. Includes optional exit program for full customization and automation. Respond to messages remotely via optional responder web portal.|
|Watch For Specific Messages||Set watches for specific message IDs arriving at any message queue or in the System History Log. Includes optional exit program for full customization and automation.|
iEventMonitor - available for a single partition, with available multi-partition discount.
iEventMonitor - for LPAR License. Install iEventMonitor on multiple LPARS on a single system.
Maintenance: Free for first year of ownership. Billed annually thereafter. See company policies section for more information.
iEventMonitor is available for a FREE 30 day trial.
Place your order here for a FREE trial of iEventMonitor.