ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvmonitorsec.htm

93 lines
6.7 KiB
HTML
Raw Permalink Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Monitor security" />
<meta name="abstract" content="This set of topics discuss various techniques for monitoring and auditing security on your system." />
<meta name="description" content="This set of topics discuss various techniques for monitoring and auditing security on your system." />
<meta name="DC.Relation" scheme="URI" content="rzamvplansec.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvplansecauditing.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvdevelopintrusiondetectstrat.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorqueueaccess.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonsubsystem.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorauth.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorsecmsg.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvpreventlossauditinfo.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvmanauditjournal.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvsavedeleteauditjournalreceivers.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvstopaudit.htm" />
<meta name="DC.Relation" scheme="URI" content="rzamvusehistlog.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="monitorsec" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Monitor security</title>
</head>
<body id="monitorsec"><a name="monitorsec"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Monitor security</h1>
<div><p>This set of topics discuss various techniques for monitoring and
auditing security on your system.</p>
<p>In a <span class="uicontrol">security audit</span>, you would be reviewing and
examining the activities of a data processing system to test the adequacy
and effectiveness of procedures for data security and data accuracy. The <span class="uicontrol">security
audit journal</span> is the primary source of auditing information on
the system. A security auditor inside or outside your organization can use
the auditing function provided by the system to gather information about security-related
events that occur on the system.</p>
<p>An <span class="uicontrol">intrusion detection</span> system is software that detects
attempts or successful attacks on monitored resources that are part of a network
or host system.</p>
<div class="p"><span class="uicontrol">Monitoring security</span> regularly has two basic goals: <ul><li>Making sure that you protect your company resources adequately.</li>
<li>Detecting unauthorized attempts to access your system and your companys
information.</li>
</ul>
</div>
<p>This set of topics describes the tasks for auditing and monitoring system
security: </p>
</div>
<div>
<ul class="ullinks">
<li class="ulchildlink"><strong><a href="rzamvplansecauditing.htm">Plan security auditing</a></strong><br />
Use this information to plan security auditing for your systems.</li>
<li class="ulchildlink"><strong><a href="rzamvdevelopintrusiondetectstrat.htm">Prevent and detect security exposures</a></strong><br />
The following information is a collection of tips to help you detect potential security exposures.</li>
<li class="ulchildlink"><strong><a href="rzamvmonitorqueueaccess.htm">Monitor access to output and job queues</a></strong><br />
This article describes how to monitor access to output and job queues, explains why it is important, and provides step-by-step instructions.</li>
<li class="ulchildlink"><strong><a href="rzamvmonsubsystem.htm">Monitor subsystem descriptions</a></strong><br />
This article provides suggestions for reviewing the subsystem descriptions that currently exist on your system.</li>
<li class="ulchildlink"><strong><a href="rzamvmonitorauth.htm">Monitor authority</a></strong><br />
This topic provides basic suggestions for monitoring the effectiveness of the security safeguards on your system.</li>
<li class="ulchildlink"><strong><a href="rzamvmonitorsecmsg.htm">Monitor security messages</a></strong><br />
How to monitor security messages and why they are important</li>
<li class="ulchildlink"><strong><a href="rzamvpreventlossauditinfo.htm">Prevent loss of auditing information</a></strong><br />
This article describes which information to look for to prevent loss of auditing information.</li>
<li class="ulchildlink"><strong><a href="rzamvmanauditjournal.htm">Manage the journal receivers</a></strong><br />
How to manage the journal receivers.</li>
<li class="ulchildlink"><strong><a href="rzamvsavedeleteauditjournalreceivers.htm">Save and delete audit journal receivers</a></strong><br />
This article describes how to save and delete audit journal receivers, explains why it is important, and provides step-by-step instructions.</li>
<li class="ulchildlink"><strong><a href="rzamvstopaudit.htm">Stop the audit function</a></strong><br />
How to turn off the auditing function</li>
<li class="ulchildlink"><strong><a href="rzamvusehistlog.htm">Use the history log</a></strong><br />
How to use the history log, why it is important, and step-by-step instructions for setting it up.</li>
</ul>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansec.htm" title="This topic collection provides you with detailed information about planning, setting up, and using your system security. This topic collection combines the information formerly in the Basic system security and planning topic collection and in the Tips and Tools for Securing Your iSeries manual.">Plan and set up system security</a></div>
</div>
</div>
</body>
</html>