iTech Solutions - for all of your IBM i System needs

iTech Solutions Group Blog

Posted on October 19, 2018

There is an audit log to monitor service function use by service tools users.  You can monitor the use of service functions through the dedicated service tools (DST) security log or through the IBM i security audit log. These logs help you trace unusual access patterns or potential security risks.  Below is information on how to access these logs for reference and use. To work with the Service Tools security log, complete the following steps: 1) Access service tools using DST on the console (To force a Dedicate Service Tools

In Archive