LATEST CONTENT
The benefit of using a data mart for audit journal information is to keep audit journal information on the system for a longer time than you typically could when leaving the information in audit journal receivers. IBM i 7.5 TR 5 and 7.4 TR11 enhance your ability to be even more selective about what information you have in the data mart.
IDS is a built-in IBM i security feature. It is designed to detect and notify in or outbound attempts to hack, disrupt or deny service to the system. It is a socket-level feature that can be complicated to configure and tune. This article explores a very basic configuration to alert for intrusion events.
Let's take a look at security enhancements in the IBM technology refreshes to be delivered in Nov 2024
DORA is a new European Union regulation called the “Digital Operational Resilience Act.” It was adopted in December 2022 and is enforceable as of January 17, 2025. Kisco Systems can help regulated companies comply with DORA.
IBM i Access Client Solutions (ACS) can provide the ability for a user to change their password. Use the "pwchange" plugin from a windows command line to launch the password change UI without having to load the full ACS client.
Starting in IBM i OS release level 7.5, customers can use authorization lists to control who uses NetServer to access the Integrated File System (IFS), including individual shares.
If your organization is running your IBM i system using multiple Auxiliary Storage Pools (ASP), then placement of the journal and journal receivers for the database files you are tracking is important.
With IBM's move towards an IBM i subscription model, tracking license status is now more important than ever. Here's how to stay on top of IBM i licensing.
Here are a couple of procedures to view the list of SSL certificates that are installed on your IBM i.