=============================================================== 
SEARCH400 | Security Tip 
May 14, 2002 

Essential explanations and tools to help secure the iSeries. 
 More tips: 
http://search400.techtarget.com/tipsIndex/0,289482,sid3_tax2f8,00.html

=============================================================== 
FROM OUR SPONSORS:

Download FREE intrusion detection software.
http://search400.com/r/0,,3295,00.htm?PowerTechSTIS2

=============================================================== 
In today's technical advice roundup you'll find tips, expert 
answers and input from your peers to the following iSeries 
security questions and concerns: 

Today's Featured Security Tip: 
  -- Check up on a specific user

Answers to Other Technical Questions: 
  1. Give a user temporary *RWX authority     
  2. Secure your iSeries
  3. Authority problem after file transfer
  4. Even on iSeries, security takes planning and work

Important Announcements and Links 
  - Expert profile: Carol Woodbury, Search400 security expert
  - Tips Contest: April winners announced
  - Advice: Managing the iSeries Discussion Forum  
  - Featured Book: Implementing AS/400 Security
  - Systems Management: Best Web Links on Security 

=========================================================== 
Today's Featured Tip 
=========================================================== 

Check up on a specific user 
 
For some reason, my career in IT frequently included responsibility
for the company telephone system. Oftentimes, I would end up with a
department head closeting himself in my office to obtain a report of
telephone activity for an employee that he suspected of some
malfeasance.   Most of the time when that came up, I had the luxury
of having the data already collected in a call-accounting software
package and could just run a report and send the department head on
his way. 
 
In this day of heightened security consciousness, I can fully 
expect to see this scenario played out with data access as the 
expressed concern of this same department head.  Unfortunately, 
software for full implementation of security reporting can be 
very pricey.  But if you just want to check up on someone, 
OS/400 has very good auditing capabilities that you can use 
down to the individual user level.  You can do this 
without a major headache.  Rich Loeber, president of Kisco 
Information Systems Inc., shows you how you can target a 
specific user and leave the others out of it. 

>> CLICK here for the full tip: 
http://www.search400.com/tip/1,289483,sid3_gci822881,00.html

============================================================= 
Answers to Other Security Questions 
============================================================= 

1. Give a user temporary *RWX authority 
One user writes, "Since the root system in the IFS does not 
support adopted authority, what's the best way to give a user 
temporary *RWX authority to a MS Word document that normally 
has *RX authority for all users (*PUBLIC) and object 
authorities of *NONE?" Security expert Carol Woodbury offers 
some advice.
http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid465526_tax288767,00.html

2. Secure your iSeries
The iSeries is one of the most secure systems, but there are 
still ways for data to be compromised -- network holes and 
users with too much authority, for example. The information in 
this Search400 Featured Topic helps you close up any gaps you 
may have.
http://search400.techtarget.com/featuredTopic/0,290042,sid3_gci783697,00.html

3. Authority problem after file transfer
One user writes, "I have an in-house "Move" menu that 
allows me to move programs from the Development iSeries 
onto the Production iSeries without typing all the commands 
myself. My problem is that the program I am moving is 
losing some authority in the transfer. I've checked that 
Qpgmr owns my program and only one user group has *Use 
authority to it. I'm not sure where to look for causes, any 
ideas?" Site expert Tim Granatir has some suggestions.
http://search400.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]/1769

4. Even on iSeries, security takes planning and work
Shops that think their iSeries is secure, guess again. If you 
don't have a security policy in place, your system could be 
open to breaches that you aren't aware of. Check out this tip 
to learn the four steps to proper security.
http://search400.techtarget.com/tip/1,289483,sid3_gci809238,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
SEARCH400 FEATURED TRAINING, BOOKS AND RESEARCH 

Take advantage of this week training special and get 50% OFF 
the "C Programming" Training Course. This course addresses two 
major areas of C programming: pointers and input/output and 
also teaches the techniques for working with pointers and 
functions and performing input /output functions. Take 
advantage of your member special today at: 
http://learn.serebra.com?s=52&i=wt2170&m=40048p&p=c&t=o

_____________________________________________________________ 
:::::::  DON'T MISS THESE IMPORTANT MESSAGES AND LINKS :::::: 

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
EXPERT PROFILE | Carol Woodbury, Search400 security expert 

Carol recently started SkyView Partners, a security consulting 
and services company. Prior to that, she was vice president of 
research and development at the PowerTech Group, a security 
solutions provider for the iSeries. Carol was also the chief 
engineering manager for iSeries security and OS/400 security 
architect for over 10 years at IBM in Rochester, Minn. Carol is 
the primary author of Implementing AS/400 Security. She has 
also written numerous articles on security and is a popular 
speaker at user conferences and seminars around the world.

Let Carol's experience work for you! Ask Carol Security-related 
questions anytime. Go to:
http://Search400.techtarget.com/ateQuestion/0,289624,sid3_cid423497_tax288767,00.html

>> RECENT Q&A's with Carol you may find of interest:

* Adopting authorities through OpsNav?
http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid451019_tax288767,00.html

* Finding an FTP client that supports SSL  
http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid451020_tax288767,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
APRIL WINNERS ANNOUNCED | Search400 tips contest

Congratulations to David Ong for winning Search400's Tip of the 
Month contest for April. David won a Secret Agent Man Digital 
Seiko Watch and was added to our Hall of Fame for his tip: 
"Accessing any job's QTEMP."
http://www.search400.com/tip/1,289483,sid3_gci816185,00.html

Congratulations also to our runner-up winners: Jean-Marie 
Sauvageot, Shawn Hunt and Clive Griffiths. You may read their 
winning tips at 
http://search400.techtarget.com/tipsHallOfFame/0,289489,sid3_prz804422_cts804420,00.html

NEW CONTEST FOR MAY: It's a new month, and we have a new 
contest. This time we're giving away a mini digital 
camera/webcam/movie clip. It takes photography and videography 
to a new level. Send in your tip -- administrator, programmer, 
security or WebSphere Strategies -- for your chance to win. 

>> SUBMIT a Tip:
http://www.search400.com/tipsPrize/0,289492,sid3_prz819017_cts819011,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
MANAGING THE ISERIES DISCUSSION FORUM | Interact with your peers 

Check out Search400's new Managing the iSeries discussion 
forum. If you have a performance problem you just can't figure 
out, or you need help recovering data after a system crash, we 
recommend you check out this forum. Other system managers can 
help you with these and other management issues. 

>> DISCUSSION THREADS you may find of interest: 

* IFS data authority issues
http://search400.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]/504!viewtype=convdate&skip=&expand=

* LPARS and performance tuning
http://search400.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]/488!viewtype=convdate&skip=&expand=

>> CLICK HERE to enter the forum... 
http:[EMAIL PROTECTED]^[email protected]!viewtype=&skip=&expand=

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
THIS WEEK'S FEATURED BOOK | Search400's Bookstore

Title: Implementing AS/400 Security 
Author: Carol Woodbury and Wayne Madden

Changing system security needs and new system enhancements make 
this a must have book for every iSeries 400 shop. Wayne Madden 
and search400 expert Carol Woodbury bring a wealth of expertise 
to this timely topic, making creating, updating, and 
implementing vital security measures clear and easily 
understood.
http://www.digitalguru.com/DigitalGuru/product_detail.asp?catalog_name=Books&product_id=1583040730&partner_id=55

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
SYSTEMS MANAGEMENT | Best Web Links on Security 

These Best Web Links provide you with resources to help you 
make your system as secure as it can be. Don't waste your time 
scouring the Web; we've already done that for you. 
http://search400.techtarget.com/bestWebLinks/0,289521,sid3_tax2c5,00.html

_____________________________________________________________ 
:::::::::::::::::::  SEARCH400 CONTACTS   ::::::::::::::::::: 

 TIP MAILBOX, (mailto:[EMAIL PROTECTED]) 
   >> Send us feedback on tips and ideas for new tip content. 
_______________________________________________________________ 
  
 MICHELLE DAVIDSON, Site Editor 
(mailto:[EMAIL PROTECTED]) 
   >> Send us your story ideas and best practices. 
_______________________________________________________________ 

 DEBRA TART, Assistant Editor (mailto:[EMAIL PROTECTED]) 
   >> Send us your tips and Best Web Links. 
_______________________________________________________________ 

 DAVID GABEL, Executive Tech Editor 
(mailto:[EMAIL PROTECTED]) 
   >> Send me your technical tips and tip ideas. 
_______________________________________________________________

 GABRIELLE DERUSSY (mailto:[EMAIL PROTECTED]) 
   >> Sponsor this or any other TechTarget newsletter. 
_______________________________________________________________

::::::::::::::::::::  ABOUT THIS NEWSLETTER:::::::::::::::::: 

Created by TechTarget (http://www.techtarget.com) 
 TechTarget - The Most Targeted IT Media 
 Copyright 2002, All Rights Reserved. 









If you no longer wish to receive this newsletter simply reply to this
message with "REMOVE" in the subject line.  Or, visit
http://search400.techtarget.com/register and adjust your
subscriptions accordingly.If you choose to unsubscribe using our
automated processing, you must send the "REMOVE" request from the
email account to which this newsletter was delivered.  Please allow
24 hours for your "REMOVE" request to be processed.

Reply via email to