IBM i Application Audit

This is the audit log for application access activity(exit program controlled activity) to the IBM i Server

It allows quick and easy identification of access events and identifies trends

Architecture

Highlights

  • Powerful filtering capability
  • Event level detail, includes Transaction ,user IP address and Object
  • Graph and table display options
  • Predefined summary and event reports
  • User defined event reports

Organizational Benefits

  • Ability to investigate security incidents at the level of server activity
  • Ability to review and analyze application access trends such as security officer activity, specific library and file access, application usage types such as ODBC,FTP, remote command,database
  • Ability to review and analyze unauthorised access attempt statistics such as invalid user, invalid password, rejection when trying to update database tables
  • Provides an online log of activity that is not monitored by the operating system
  • Answers information systems auditing compliance requirements

Enforcive Application Audit

Enforcive Application Audit Filter    Enforcive Application Audit Event

IBM i Security, Tools, development, Change Control and Support 

DISCLAIMER: Please read our terms for the use of this website, if you do not agree to them please do not use our website. If you do use our website you agree to the terms Terms Of Use

Ask a question
1000 characters left