Need Help? Start a Live Chat.

IBM i Security: Event Logging & Active Monitoring

A Step by Step Guide

Logging-eBook-Cover.pngActive monitoring is the most critical and effective security control that an organization can deploy. The IBM i server is a rich source of security information. Unlike many Windows and Linux server deployments, the IBM i platform can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor. 

This eBook discusses:

  • Real-time security event logging and monitoring

  • Security architecture and logging sources on the IBM i

  • Creating the IBM security audit journal QAUDJRN

  • Enabling IBM security events through system values

  • File integrity monitoring (FIM)

  • A step by step checklist begin collecting and monitoring IBM i security logs