Business Case: Use best practices to configure and monitor your IBM i against internal and external security threats as well as end-user errors. Enable consistent and automated real time reporting to most effectively audit and monitor your IBM i. This module will extend your knowledge of the auditing and monitoring capabilities of the IBMi enabling you to more effectively administer and guard your company's IBM i assets.
Part I: Configuration and Enablement of IBM i Auditing Part II: Monitoring and Reporting on IBM i Compliance and Security Part III: LIVE Q&A and Panel Discussion