At one time or another, every system administrator and security officer face the question “Who did it?” IBM i puts the ability to audit at your disposal, but how do you convert the raw data into useful information?
Auditors and internal policy controls often require the review of numerous security details and configuration metrics—a time-consuming and resource-intensive process. Often, we do it only when we have to, instead of making it part of an ongoing security plan.
Join IBM i expert Amneris Teruel for a quick webinar on June 4th to understand:
- How to configure IBM i to record system and user events
- What activities can (and cannot) be audited
- The mechanisms available to extract audit data from the system
- What other information an auditor wants to see
Join us to gain the clarity and confidence you need to make IBM i auditing work for you.