This eBook discusses:
Real-time security event logging and monitoring
Security architecture and logging sources on the IBM i
Creating the IBM security audit journal QAUDJRN
Enabling IBM security events through system values
File integrity monitoring (FIM)
A step by step checklist begin collecting and monitoring IBM i security logs