=============================================================== SEARCH400 | Security Tip May 14, 2002
Essential explanations and tools to help secure the iSeries. More tips: http://search400.techtarget.com/tipsIndex/0,289482,sid3_tax2f8,00.html =============================================================== FROM OUR SPONSORS: Download FREE intrusion detection software. http://search400.com/r/0,,3295,00.htm?PowerTechSTIS2 =============================================================== In today's technical advice roundup you'll find tips, expert answers and input from your peers to the following iSeries security questions and concerns: Today's Featured Security Tip: -- Check up on a specific user Answers to Other Technical Questions: 1. Give a user temporary *RWX authority 2. Secure your iSeries 3. Authority problem after file transfer 4. Even on iSeries, security takes planning and work Important Announcements and Links - Expert profile: Carol Woodbury, Search400 security expert - Tips Contest: April winners announced - Advice: Managing the iSeries Discussion Forum - Featured Book: Implementing AS/400 Security - Systems Management: Best Web Links on Security =========================================================== Today's Featured Tip =========================================================== Check up on a specific user For some reason, my career in IT frequently included responsibility for the company telephone system. Oftentimes, I would end up with a department head closeting himself in my office to obtain a report of telephone activity for an employee that he suspected of some malfeasance. Most of the time when that came up, I had the luxury of having the data already collected in a call-accounting software package and could just run a report and send the department head on his way. In this day of heightened security consciousness, I can fully expect to see this scenario played out with data access as the expressed concern of this same department head. Unfortunately, software for full implementation of security reporting can be very pricey. But if you just want to check up on someone, OS/400 has very good auditing capabilities that you can use down to the individual user level. You can do this without a major headache. Rich Loeber, president of Kisco Information Systems Inc., shows you how you can target a specific user and leave the others out of it. >> CLICK here for the full tip: http://www.search400.com/tip/1,289483,sid3_gci822881,00.html ============================================================= Answers to Other Security Questions ============================================================= 1. Give a user temporary *RWX authority One user writes, "Since the root system in the IFS does not support adopted authority, what's the best way to give a user temporary *RWX authority to a MS Word document that normally has *RX authority for all users (*PUBLIC) and object authorities of *NONE?" Security expert Carol Woodbury offers some advice. http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid465526_tax288767,00.html 2. Secure your iSeries The iSeries is one of the most secure systems, but there are still ways for data to be compromised -- network holes and users with too much authority, for example. The information in this Search400 Featured Topic helps you close up any gaps you may have. http://search400.techtarget.com/featuredTopic/0,290042,sid3_gci783697,00.html 3. Authority problem after file transfer One user writes, "I have an in-house "Move" menu that allows me to move programs from the Development iSeries onto the Production iSeries without typing all the commands myself. My problem is that the program I am moving is losing some authority in the transfer. I've checked that Qpgmr owns my program and only one user group has *Use authority to it. I'm not sure where to look for causes, any ideas?" Site expert Tim Granatir has some suggestions. http://search400.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]/1769 4. Even on iSeries, security takes planning and work Shops that think their iSeries is secure, guess again. If you don't have a security policy in place, your system could be open to breaches that you aren't aware of. Check out this tip to learn the four steps to proper security. http://search400.techtarget.com/tip/1,289483,sid3_gci809238,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- SEARCH400 FEATURED TRAINING, BOOKS AND RESEARCH Take advantage of this week training special and get 50% OFF the "C Programming" Training Course. This course addresses two major areas of C programming: pointers and input/output and also teaches the techniques for working with pointers and functions and performing input /output functions. Take advantage of your member special today at: http://learn.serebra.com?s=52&i=wt2170&m=40048p&p=c&t=o _____________________________________________________________ ::::::: DON'T MISS THESE IMPORTANT MESSAGES AND LINKS :::::: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- EXPERT PROFILE | Carol Woodbury, Search400 security expert Carol recently started SkyView Partners, a security consulting and services company. Prior to that, she was vice president of research and development at the PowerTech Group, a security solutions provider for the iSeries. Carol was also the chief engineering manager for iSeries security and OS/400 security architect for over 10 years at IBM in Rochester, Minn. Carol is the primary author of Implementing AS/400 Security. She has also written numerous articles on security and is a popular speaker at user conferences and seminars around the world. Let Carol's experience work for you! Ask Carol Security-related questions anytime. Go to: http://Search400.techtarget.com/ateQuestion/0,289624,sid3_cid423497_tax288767,00.html >> RECENT Q&A's with Carol you may find of interest: * Adopting authorities through OpsNav? http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid451019_tax288767,00.html * Finding an FTP client that supports SSL http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid451020_tax288767,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- APRIL WINNERS ANNOUNCED | Search400 tips contest Congratulations to David Ong for winning Search400's Tip of the Month contest for April. David won a Secret Agent Man Digital Seiko Watch and was added to our Hall of Fame for his tip: "Accessing any job's QTEMP." http://www.search400.com/tip/1,289483,sid3_gci816185,00.html Congratulations also to our runner-up winners: Jean-Marie Sauvageot, Shawn Hunt and Clive Griffiths. You may read their winning tips at http://search400.techtarget.com/tipsHallOfFame/0,289489,sid3_prz804422_cts804420,00.html NEW CONTEST FOR MAY: It's a new month, and we have a new contest. This time we're giving away a mini digital camera/webcam/movie clip. It takes photography and videography to a new level. Send in your tip -- administrator, programmer, security or WebSphere Strategies -- for your chance to win. >> SUBMIT a Tip: http://www.search400.com/tipsPrize/0,289492,sid3_prz819017_cts819011,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- MANAGING THE ISERIES DISCUSSION FORUM | Interact with your peers Check out Search400's new Managing the iSeries discussion forum. If you have a performance problem you just can't figure out, or you need help recovering data after a system crash, we recommend you check out this forum. Other system managers can help you with these and other management issues. >> DISCUSSION THREADS you may find of interest: * IFS data authority issues http://search400.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]/504!viewtype=convdate&skip=&expand= * LPARS and performance tuning http://search400.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]/488!viewtype=convdate&skip=&expand= >> CLICK HERE to enter the forum... http:[EMAIL PROTECTED]^[email protected]!viewtype=&skip=&expand= =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- THIS WEEK'S FEATURED BOOK | Search400's Bookstore Title: Implementing AS/400 Security Author: Carol Woodbury and Wayne Madden Changing system security needs and new system enhancements make this a must have book for every iSeries 400 shop. Wayne Madden and search400 expert Carol Woodbury bring a wealth of expertise to this timely topic, making creating, updating, and implementing vital security measures clear and easily understood. http://www.digitalguru.com/DigitalGuru/product_detail.asp?catalog_name=Books&product_id=1583040730&partner_id=55 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- SYSTEMS MANAGEMENT | Best Web Links on Security These Best Web Links provide you with resources to help you make your system as secure as it can be. Don't waste your time scouring the Web; we've already done that for you. http://search400.techtarget.com/bestWebLinks/0,289521,sid3_tax2c5,00.html _____________________________________________________________ ::::::::::::::::::: SEARCH400 CONTACTS ::::::::::::::::::: TIP MAILBOX, (mailto:[EMAIL PROTECTED]) >> Send us feedback on tips and ideas for new tip content. _______________________________________________________________ MICHELLE DAVIDSON, Site Editor (mailto:[EMAIL PROTECTED]) >> Send us your story ideas and best practices. _______________________________________________________________ DEBRA TART, Assistant Editor (mailto:[EMAIL PROTECTED]) >> Send us your tips and Best Web Links. _______________________________________________________________ DAVID GABEL, Executive Tech Editor (mailto:[EMAIL PROTECTED]) >> Send me your technical tips and tip ideas. _______________________________________________________________ GABRIELLE DERUSSY (mailto:[EMAIL PROTECTED]) >> Sponsor this or any other TechTarget newsletter. _______________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER:::::::::::::::::: Created by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002, All Rights Reserved. If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://search400.techtarget.com/register and adjust your subscriptions accordingly.If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.
