× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: Re: Level 40 Security Verses Level 30
  • From: John Earl <johnearl@xxxxxxxxxxxxxxx>
  • Date: Sun, 12 Dec 1999 14:23:44 -0800
  • Organization: The PowerTech Group

Mike,

Mike Shaw wrote:
> 
> Arlene,
> 
> time.  I did this earlier this year.  Started monitoring the audit journal
> and it was over 60 pages of stuff printing out for the AF entries
> alone......You will be amazed at what will show up initially on the reports!

Are you sure that all of these were Level 40 violations? 
You can get AF's for other events (such as user's actually
not being authorised to objects)

jte

> :-)
> 
> Another thing to watch for are vendor packages that are not level 40
> compliant.  ASC's SEQUEL product had to be upgraded to be Level 40
> compliant.
> 
> HTH,
> 
> Mike Shaw
> Senior AS/400 Tech Support
> North American Mortgage Company
> Santa Rosa, CA
> 
> ----- Original Message -----
> From: Arlene M Soderlund <Arlene_M_Soderlund/NFCNA.COM@nfcna.com>
> To: <MIDRANGE-L@midrange.com>
> Sent: Thursday, December 09, 1999 1:46 PM
> Subject: Level 40 Security Verses Level 30
> 
> >
> >
> >
> >
> > In the Future We will be running an application that will need the HTML
> Server
> > up and access to the Internet.  Of course IBM Security Manuals just say go
> to
> > 40.   What insights for problems does anyone have about Level 40 security
> to say
> > standard RPG jobs that adopt user authority.   How does it change profiles
> > authority or authority Lists.
> >
> > Thanks for any insight.
> >
> >
> >
> > +---
> > | This is the Midrange System Mailing List!
> > | To submit a new message, send your mail to MIDRANGE-L@midrange.com.
> > | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
> > | To unsubscribe from this list send email to
> MIDRANGE-L-UNSUB@midrange.com.
> > | Questions should be directed to the list owner/operator:
> david@midrange.com
> > +---
> >
> 
> +---
> | This is the Midrange System Mailing List!
> | To submit a new message, send your mail to MIDRANGE-L@midrange.com.
> | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
> | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
> | Questions should be directed to the list owner/operator: david@midrange.com
> +---

--
John Earl                                          
johnearl@powertechgroup.com
The PowerTech Group                        206-575-0711
PowerLock Network Security              www.400security.com
The 400 School                               
www.400school.com
--
+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.