iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on October 25, 2018

There are two ways of using this UAK management feature: Manual: A system administrator can manually kick off the process of checking UAK’s expiration date, downloading UAK, and applying UAK. This is accomplished by running the WRKSRVAGT TYPE(*UAK) command. This can also be accomplished by running the go service command to access the Electronic Service Agent on IBM i main menu, then selecting option 20 (Check and refresh Update Access Key). Automatic: By default, there is no automatic UAK checking. The Change Service Agent Attribute (CHGSRVAGTA) command can be used to

Posted on October 24, 2018

Last week I had a customer with a downed POWER5 system due to hardware failure. The situation: The system bezel said that it couldn’t find the disk drives which could’ve been a number of failing parts. This system had a single disk drive mirrored to another. The backup was questionable (i.e., the customer couldn’t guarantee what was on it) on ¼ inch tapes so it was not really compatible with current technology. Also, the customer did not have an active hardware/software maintenance contract. The system was set up for operations

Posted on October 19, 2018

There is an audit log to monitor service function use by service tools users.  You can monitor the use of service functions through the dedicated service tools (DST) security log or through the IBM i security audit log. These logs help you trace unusual access patterns or potential security risks.  Below is information on how to access these logs for reference and use. To work with the Service Tools security log, complete the following steps: 1) Access service tools using DST on the console (To force a Dedicate Service Tools

Posted on

Below are IBM i, FSP, and HMC release levels and PTFs for October 2018. This is what we are installing for our customers on iTech Solutions Quarterly Maintenance program.

Posted on October 12, 2018

If you’re looking to make improvements to your IBM i security, then you need to be able to get your whole team on the same page, which sometimes can mean common oppositions. But, does your team know the scary truth on the other side of those rebuttals? Here are a number of counterpoints to help you make security a priority in your shop. 1. We trust our employees It is important to hire those you trust and to maintain relationships to continuing to vet security worthiness. However, realism is called

Posted on October 5, 2018

This newsletter includes: [Video] POWER9 & HMC Unpacking, Racking, and Installation and Setup How To: IBM i Services Tools Security Log The Scary Truth About IBM i Security Pushbacks A Disaster Recovery Perfect Storm Managing Firmware: Using UAK Management Feature Upcoming Events Release levels and PTFs As Halloween is approaching us, and we are thinking of scary things, trick or treats, and grave yards, I thought that would be the perfect way to start my article. So, one scary thing that we have come across lately is customers who aren’t

In Archive