Another day, another security vulnerability. System administrators everywhere battle daily to keep their systems secure. When security algorithms are deemed vulnerable or another network attack is disclosed, how do you know if you’re impacted? How many issues could be caused by turning a weak security algorithm off? Tracing network traffic and analyzing the data is a tedious task and isn’t always straightforward.
IBM i 7.3 is here! IBM i 7.3 has added a feature called “Security Authority Collection” which tracks how applications and application users “use” an object. Inquiries against that collection will provide advice on securing critical business data and applications from intrusion by identifying who needs to have access to data and in what context. This is a major enhancement to security management that is unique to IBM i.(more…)
In 2012, I wrote about Function Usage Capabilities. That blog post reviewed user interfaces for function usage information, which includes a set of commands, APIs, and the Application Administration graphical user interface.(more…)
While at a conference this fall, I was asked about job accounting and prestart jobs. I thought this would be a good blog topic.
If you have set up job accounting, the system will write journal entries to the job accounting journal when the accounting code is changed or when a job ends.(more…)
We all know that security vulnerabilities seem constant and ensuring you have the correct level of software to eliminate those vulnerabilities is very important.(more…)
In the 7.2 release, IBM made many changes to improve temporary storage tracking. I’ve written about these enhancements in IBM i 7.2 Improved Temporary Storage Tracking Part 1, Part2, and Part 3 blogs. You may also want to reread the blog, Understanding Disk Space Usage, which reviews IBM i temporary and permanent storage concepts.(more…)