Oversight Review

After all of your servers have been locked down, continue monitoring for rejected transactions. Add user rules as necessary to amend any access oversights. In urgent situations you have the option of changing the *PUBLIC *REJECT value back to *OS400 while research of the prior rules are reviewed.

Use reports to look at the rejected and allowed transactions. Reports are available by Server, User profile, and Location (IP address). See Reports.

Auditing Network Security Rules

While the majority of oversight and Rule management will take place from the Management System, Network Security also allows Rules to be managed directly from an Endpoint. This might be necessary, for example, if access to the Management System is unavailable, but critical business processes require a Rule to be changed on an Endpoint. To verify the integrity of Network Security throughout your network, and ensure adherence to your organization's security policy, you can run an audit to identify and manage Rules that have been changed on Endpoints directly.

NOTE: Audits only apply to Endpoints. The Management System is always skipped during an audit.

To conduct an audit, you must first define a System Group that includes the systems you would like to audit, then use Central Administration's Audit Menu to complete the audit, applying remedies as necessary.

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
7.17 | 201803210423