56 lines
4.0 KiB
HTML
56 lines
4.0 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="concept" />
|
||
|
<meta name="DC.Title" content="Monitor service function use" />
|
||
|
<meta name="abstract" content="You can monitor the use of service functions through DST, and you can monitor service tools use through the security audit log. These logs can help you trace unusual access patterns or other potential security risks." />
|
||
|
<meta name="description" content="You can monitor the use of service functions through DST, and you can monitor service tools use through the security audit log. These logs can help you trace unusual access patterns or other potential security risks." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamhmanagest.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamhmonitordst.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamhmonitorsecurity.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamhwhatuserids.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2003, 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2003, 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="rzamhmonitor" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>Monitor service function use</title>
|
||
|
</head>
|
||
|
<body id="rzamhmonitor"><a name="rzamhmonitor"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">Monitor service function use</h1>
|
||
|
<div><p>You can monitor the use of service functions through
|
||
|
DST, and you can monitor service tools use through the security audit log.
|
||
|
These logs can help you trace unusual access patterns or other potential security
|
||
|
risks.</p>
|
||
|
</div>
|
||
|
<div>
|
||
|
<ul class="ullinks">
|
||
|
<li class="ulchildlink"><strong><a href="rzamhmonitordst.htm">Monitor service function use through DST</a></strong><br />
|
||
|
Any time a user signs on to DST using a service tools user ID, the event is logged by the service tools security log. You can use the DST security log to monitor service functions.</li>
|
||
|
<li class="ulchildlink"><strong><a href="rzamhmonitorsecurity.htm">Monitor service tools use through i5/OS security audit log</a></strong><br />
|
||
|
You can use the <span class="keyword">i5/OS™</span> security
|
||
|
audit log to record service tools actions.</li>
|
||
|
</ul>
|
||
|
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamhmanagest.htm" title="You can develop an effective strategy for managing and maintaining service tools user IDs and passwords.">Manage service tools user IDs and passwords</a></div>
|
||
|
</div>
|
||
|
<div class="relref"><strong>Related reference</strong><br />
|
||
|
<div><a href="rzamhwhatuserids.htm" title="Service tools user IDs are user IDs that are required to access service functions through dedicated service tools (DST), system service tools (SST), iSeries Navigator (for logical partitions and disk unit management), and Operations Console. Service tools user IDs are created through DST or SST and are separate from user profiles.">Service tools user IDs</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|