× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Raz-lee (https://razlee.com/isecurity-auditing-solutions/)
has a utility called Audit and a utility called Capture that do just that.
I have toyed with both, Work great.

my 2 cnts
Gad


date: Fri, 13 Sep 2024 14:53:29 -0400
from: Gavin Inman <midrangelist@xxxxxxxxxxxxxx>
subject: Re: How to see who has signed onto an IBM i and what they are
doing afterwards?

Are you trying to track admin's?

The only 100% sure way I know to see what a user has done afterwards,
(short of writing your own solution), is to use Powertech Authority
Broker (Now owned by Help Systems).

I used to work at a company where I implemented this.? The product
tracks and stores screen by screen pictures of everything the user
does.? You can run a report and see every screen the user saw..

It's not cheap, but it works.

Gavin Inman


On 9/13/2024 12:40 PM, Thomas Burrows wrote:

Is there a way to see who has signed onto an IBM i and what they are doing
afterwards?

Maybe some history files out there somewhere?

Thomas in Texas





As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.