TK242G IBM Security zSecure RACF and SMF Auditing

Overnet Education
A Segrate

Chiedi informazioni a un consulente Emagister

Informazioni importanti

Tipologia Corso
Luogo Segrate
Durata 2 Giorni
  • Corso
  • Segrate
  • Durata:
    2 Giorni

A continuazione troverai il programma di questo corso disegnato per migliorare le tue competenze e permetterti di realizzare gli obiettivi stabiliti.
This course describes the audit concerns reported by IBM® Security zSecure™ Audit. The course explains how to audit the content of your Resource Access Control Facility (RACF®) database and z/OS® system. You can measure your current security settings against the security requirements of a selected policy level. In addition, you learn about an Access Monitor data set that contains statistics about all RACF decisions taken. This information is helpful for finding profiles, permissions, or connections that are not used and can, therefore, be removed from the RACF database. Furthermore, you learn how to review the current general Service Management Framework (SMF) and RACF audit settings. This course explains how to use and interpret the pre-defined SMF audit reports, and how to create your own customized SMF reports. Finally, the concepts of the Library status and change analysis functions are explained and demonstrated.


Dove e quando

Inizio Luogo
Via Cassanese, 224, Palazzo Mantegna, Scala A, 20090, Milano, Italia
Visualizza mappa
Inizio Consultare
Via Cassanese, 224, Palazzo Mantegna, Scala A, 20090, Milano, Italia
Visualizza mappa

Cosa impari in questo corso?



  • List the RACF resources that need to be audited
  • Generate and interpret an audit concerns report
  • Identify all the profiles owned by a particular user
  • Identify the users authorized to maintain RACF application segments
  • Generate and interpret user reports
  • Identify last logon and password aging
  • Identify users with system-wide authorities
  • Identify users with group specific authorities
  • Generate a report of trusted users
  • Identify sensitive profiles and the users who can modify them
  • Identify users who can create profiles of various types
  • Audit started tasks and programs
  • Generate audit reports about CICS regions, transactions, and programs
  • Generate audit reports about IMS regions, transactions, and program specification blocks
  • Generate audit report about DB2 region
  • Explain the concepts of SMF auditing
  • Report which events are logged in SMF
  • Select events logged in SMF using ISPF interface
  • Report SMF events with predefined reports
  • Create customized SMF reports
  • Explain the Access Monitor functions and reports
  • Generate access summary overview reports
  • Compare historic access events against current RACF database definitions
  • Analyze permit, connect, profile, member, and global access entry usage
  • Remove unused profiles and authorizations
  • Use the RACF Offline component combined with Access Monitor
  • Track changes that occur in z/OS system sensitive libraries

Each participant will have a station set up with operating systems and software needed for the exercises.

Gli utenti che erano interessati a questo corso si sono informati anche su...
Leggi tutto