iTech Solutions - for all of your IBM i System needs

IBM iTech Tips

Posted on January 23, 2019

Sure you can use ANZDFTPWD (Analyze Default Passwords) to get a list of IBM i users with default passwords. You can also use some simple SQL in conjunction with the USER_INFO IBM i service in QSYS2 to do the same thing…but better. To get the standard ANZDFTPWD report you can run the following statement: So why use SQL? ANZDFTPWD gets you everything you really need to determine who has a default password right? Well, yes. However, ANZDFTPWD doesn’t give you the full picture or allow you to be proactive. It

Posted on December 12, 2018

Just a few more days to shop, to work, and to wait for Christmas. I thought I would share a little story about how iTech Solutions helped Santa prepare for Christmas this year. As many of our readers remember, Santa Claus and his operations at the North Pole are one of our prized customer accounts. We have been helping St. Nick administer his Power Systems since he was running on an AS/400 and our business partner relationship has encompassed many projects and all aspects of his IT infrastructure. When we

6 Steps to Execute an IBM i Security Project
Posted on November 26, 2018

Regulations (FISMA, HIPPA, SOX, and more) are forcing companies to evaluate how they protect their sensitive data. Industries such as finance, insurance, and healthcare have the most pressure to comply with these regulations which are geared towards protecting consumers private information.  The issue is that companies may not understand how to properly secure their data to protect their consumers. Any good security plan takes a layered approach to protect data.  You have to consider where the data resides and how someone could gain access to it.  Then you have to put

Posted on October 19, 2018

There is an audit log to monitor service function use by service tools users.  You can monitor the use of service functions through the dedicated service tools (DST) security log or through the IBM i security audit log. These logs help you trace unusual access patterns or potential security risks.  Below is information on how to access these logs for reference and use. To work with the Service Tools security log, complete the following steps: 1) Access service tools using DST on the console (To force a Dedicate Service Tools

Posted on October 12, 2018

If you’re looking to make improvements to your IBM i security, then you need to be able to get your whole team on the same page, which sometimes can mean common oppositions. But, does your team know the scary truth on the other side of those rebuttals? Here are a number of counterpoints to help you make security a priority in your shop. 1. We trust our employees It is important to hire those you trust and to maintain relationships to continuing to vet security worthiness. However, realism is called

Posted on September 25, 2018

Managing a large and complex server like the IBM i, can be daunting. Add to this the fact that you may have Scaling Up/Down/In/Out, need to control High Availability and Monitoring, Patching, Manage Backups and Restores, you have to ensure the OS is kept up to date. Even the fundamentals such as security and configuration can take significant expertise. To do this, you need the right skills, operational procedures while maintaining a best practice approach while adhering to stringent Internal/external governance. Imagine if all you had to do is manage

Posted on August 22, 2018

Many companies want to improve the state of their IBM i security, but they often don’t know where to start. They also might not understand the long-term impact of recommended changes. Let’s take a closer look at six steps to properly execute a security improvement project.

Posted on May 23, 2018

DANBURY, CONN. – iTech Solutions announces it has been shortlisted for a prestigious Cyber Security award. The category is for the best “Cyber Awareness Plan of the Year”. The winning plan will be presented to the world’s media at a prestigious black tie event in London on June 21st 2018, sponsored by Cyber Security Awards, a leading awards event for the cyber security industry. The Cyber Security Awards, established in 2014, reward the best individuals, teams and companies within the cyber security industry.

Archives