|
If you have not already done so, you might want to WRKSYSVAL F4 *PRINT ... the values changed by someone at your company relative to how IBM shipped them ... those are flagged. Now with that print-out as a reference, visit IBM AS/400 Security Advisor & get a copy of some reccommendations. http://www.as400.ibm.com/tstudio/secure1/index_av.htm http://www.as400.ibm.com/tstudio/secure1/advisor/secwiz.htm I imagine security/400 list will have some other suggestions. We have got QSYSMSG set up & I wrote a tiny CL to check the history log for who logged on with any QPDAV whatever #s in the last couple days ... I did this because I was too lazy to do DSPLOG F4 fill in the screen every time ... I just wanted a menu selection off of my CALL NITE menu to check for various kinds of no nos that might have happened recently. This also works nice for non-technical people doing my job when I have a day off. We get QPDAV whatevers when someone configures a new PC on our network without going through channels, and we need to catch this because any BPCS work they try to do will be at high risk of getting corrupted. MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac)
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.