While it’s fine to discuss the facts about an IBM i security feature, sometimes making the leap from knowledge of a topic to applying it isn’t easy. In other words, some practical examples are required for you to use the feature.
This session covers various features of IBM i security and then shows you how to use and apply them in your daily work tasks. You'll learn about debugging problems using the audit journal, determining what authority is required by profiles using the Authority Collection feature in V7R3, reducing the time of your Save Security Data using the Print Profile Internals command, and more.
Check Your IBM i Security
Get an expert's take on how secure your system is and where it could be vulnerable. Request your free Security Scan today.