iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on October 25, 2018

There are two ways of using this UAK management feature: Manual: A system administrator can manually kick off the process of checking UAK’s expiration date, downloading UAK, and applying UAK. This is accomplished by running the WRKSRVAGT TYPE(*UAK) command. This can also be accomplished by running the go service command to access the Electronic Service Agent on IBM i main menu, then selecting option 20 (Check and refresh Update Access Key). Automatic: By default, there is no automatic UAK checking. The Change Service Agent Attribute (CHGSRVAGTA) command can be used to

Posted on October 24, 2018

Last week I had a customer with a downed POWER5 system due to hardware failure. The situation: The system bezel said that it couldn’t find the disk drives which could’ve been a number of failing parts. This system had a single disk drive mirrored to another. The backup was questionable (i.e., the customer couldn’t guarantee what was on it) on ¼ inch tapes so it was not really compatible with current technology. Also, the customer did not have an active hardware/software maintenance contract. The system was set up for operations

Posted on October 19, 2018

There is an audit log to monitor service function use by service tools users.  You can monitor the use of service functions through the dedicated service tools (DST) security log or through the IBM i security audit log. These logs help you trace unusual access patterns or potential security risks.  Below is information on how to access these logs for reference and use. To work with the Service Tools security log, complete the following steps: 1) Access service tools using DST on the console (To force a Dedicate Service Tools

Posted on

People are always asking me how often they should be performing PTF maintenance, and when is the right time to upgrade their operating system. I updated this article from last month with the current levels of PTFs. Let’s look at PTFs. First, PTFs are Program Temporary Fixes that are created by IBM to fix a problem that has occurred or to possibly prevent a problem from occurring. In addition, sometimes PTFs add new functionality, security, or improve performance. Therefore, I am always dumbfounded as to why customers do not perform

Posted on October 12, 2018

If you’re looking to make improvements to your IBM i security, then you need to be able to get your whole team on the same page, which sometimes can mean common oppositions. But, does your team know the scary truth on the other side of those rebuttals? Here are a number of counterpoints to help you make security a priority in your shop. 1. We trust our employees It is important to hire those you trust and to maintain relationships to continuing to vet security worthiness. However, realism is called

Posted on October 5, 2018

A Word from iTech Solutions President, Pete Massiello. Greetings Mike As Halloween is approaching us, and we are thinking of scary things, trick or treats, and grave yards, I thought that would be the perfect way to start my article. So, one scary thing that we have come across lately is customers who aren’t doing a full backup of their machines, and could never restore their system. Steve will have an article below on a recent scenario where we had to help a customer out with restoring their system to the cloud

In Archive