1 Command Control and Monitor CL Commands. 2 Command- The Need CL commands control nearly all IBM functionality Monitoring, controlling and logging CL.

Slides:



Advertisements
Similar presentations
Wintouch eCRM A Customer Relationship Management Solution designed specifically for AS/400 or iSeries Users.
Advertisements

Copyright © 2000 by RT Lawrence Corporation. La Mirada, California, USA. All Rights Reserved. RTLFiRST – Special Processing Logic User Definable Special.
ISecurity GUI User-Friendly Interface. Features Full support of all green-screen functionality Simultaneous views of multiple iSecurity screens and activities.
Travel and Expense Management Scenario Overview
Micro Control Solutions Stability System II rev. 6.4
HORIZONT TWS/WebAdmin TWS/WebAdmin for Distributed
User Query Control An Enhancement For AS/400 Query On The IBM iSeries from  Copyright I/O International, 2005 Skip Intro.
ISecurity User Profile & System Value Replication.
Welcome to QuadraNet Systems.
1 Authority on Demand Flexible Access Control Solution.
Syslog for SIEM using iSecurity Real-Time Monitoring of IBM i Security Events.
Authority on Demand Control Authority Rights & Emergency Access.
VIREO 3.0 RYAN STEANS, TEXAS DIGITAL LIBRARY KRISTI PARK, TEXAS DIGITAL LIBRARY New features and fixes This presentation published under a Creative Commons.
Micro Control Solutions Annual Product Review rev. 6.5 “Click” for next slide Move to the next slide when the request appears.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Travel and Expense Management Scenario Overview
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Guide to Linux Installation and Administration, 2e1 Chapter 6 Using the Shell and Text Files.
1 General Reporting HRMS Reports There are two types of HRMS reports: Standard and Customized. Standard reports came with the SAP Software and relate to.
SYSLOG Real-Time Monitoring of System i Events. What is SYSLOG? Multi server environments are now the reality at most sites; however the number of operators.
Train The Trainer Employee Central Administration
1 Audit Next Generation Monitoring, Compliance & QAUDJRN Reporting.
1 System Control & MSGQ. 2 System Control & MSGQ Features Uses QSYSOPR or any application message queue data as input to iSecurity Action module Enables.
1 Password Reset Effortless, Self service User Password Reset.
Audit Next Generation Monitoring, Compliance & Reporting
1 Compliance Evaluator Single-View Overall Compliance Reports.
1 Action Automated Security Breach Reporting and Corrections.
AP-Journal Application Security & Business Analysis.
Compliance Assist Refresher Instruction Guide Adding or Editing Unit/College Strategic Goals.
Creating a Single Sign On Account. To create a Single Sign On ID please visit and select the option to create a new account.
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
The Islamic University of Gaza
Employee Central Administration
Find these slides in the HRMS Basics course located at: Department of.
1 Authority on Demand Flexible Access Control Solution.
Mastering the AS/400, Third Edition, author Jerry Fottral 1 Week 2 The System The AS/400 is a multi-user, multi-tasking system -- a system on which many.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Firewall End-to-End Network Access Protection for IBM i.
Ashley Hawley. Project Description Business Need User Profiles Development Technology Testing Plan Deliverables Demonstration Conclusion.
1 May 2011 Removing the Hay to find… iBi: IBM i Business Intelligence BI Datathe Needles.
1 Automatic Tracing of Program and File Changes on IBM i Inside Change Tracker.
1 Action Automated Security Breach Reporting and Corrections.
April 2004 At A Glance CAT is a highly portable exception monitoring and action agent that automates a set of ground system functions. Benefits Automates.
Firewall End-to-End Network Access Protection for IBM i.
1 Authority on Demand Provide high authority “as-needed” with full Audit Trail.
1 PTF Tracker Automatic Tracking of PTFs and Software Changes.
LINCPlus Overview Complete binding preparation module includes features such as security, titles database, reports and job costing options. Integrated.
1 Assessment Comprehensive Analysis of IBM i Security.
WESS Safety Authority WESS Module SA-2 SA Functions Modify Existing User Accounts.
UNCLASSIFIED – For Official Use Only 1 Contract Load Notification “Fly-in” Action ( Continue to Page Down/Click on each page…) Electronic Document Access.
ACCOUNT ADMINISTRATION. Objectives In this session you will learn how to: –Create Business Units. –Create new users and manage security settings. –Configure.
Managing Security Options Dawn Mihelich Adding/Modifying Users Security Manager Setup Do not Change Fields.
1 View Record and Field-Level Security. 2 View – Database Environment Conceals sensitive field data from unauthorized users, with no modifications to.
Munis Version 9.1 & 8.3 Sneak Peek System Administration.
V7 Foundation Series Vignette Education Services.
Encryption DB2 Field Encryption for IBM i. The Need for Encryption PCI-DSS, HIPAA, FDA 21 CFR Part 11, and other regulations Use cases: Credit Card Numbers,
Information Marketing Group, Inc. Discipline & Bullying.
17 Copyright © 2006, Oracle. All rights reserved. Information Publisher.
Syslog for SIEM Products Using iSecurity Real-Time Monitoring of IBM i Security Events.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Featured Enhancements to the IDE & Debugger
Complete Management of your Entire Backflow Program
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
April Monthly Release GDPR Configuration Preview Printable Guide
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
iSecurity AP Journal Training
iSecurity Password-Reset Training
Authority on Demand Control Authority Rights & Emergency Access
Presentation transcript:

1 Command Control and Monitor CL Commands

2 Command- The Need CL commands control nearly all IBM functionality Monitoring, controlling and logging CL commands is essential for on- going corporate functioning and for SOX, PCI, HIPAA, etc. compliance Difficult to control the use of CL commands & their parameters CL commands entered from: command line menu option part of a program FTP etc. Command provides a solution for System administrators Auditors

3 The Command Solution Provides total control over system & user defined CL commands Covers all methods of entering CL commands Control commands, parameters, origin, context (program which initiated CL command), user issue the command, etc. Provides easy-to-define ways to react to specific situations Allow normal CL command processing to continue Allow CL command processing after modifying parameters or parts of parameters Execute a different CL command Reject the CL command Sends real-time alerts as event-specific s or SMS, Syslog, Twitter, MSGQ messages. Can execute CL script.

4 Command: Unique Support for Complex Parameter Structures The structure of CL command parameters can be complex; for example, some of the Change User Profile (CHGUSRPRF) parameters are: Qualified: INLPGM( library / program ) Composed of elements: EIMASSOC( admin *ADMIN *REPLACE ) Include a list of values: SUPGRPPRF( grpprf1 grpprf2 gprpprf3 ) To properly analyze a CL command parameter, accurate referral is required. Command is the only product that can refer, for analysis or change, to each part of a complex parameter separately, as well as to the parameter as a whole. Command includes a variety of selection criteria which enable replacing, adding or removing qualifiers, elements and list elements!

5 Command Features System or User Defined CL commands can be filtered according to the relationship between parameters, originator (job, user, IP) and context (from which program, environment) Reference to a specific qualifier or element allows differentiating between “PAYROLL” as part of the file name or the library name itself Selection criteria include EQ, LIST, LIKE, START, etc. and ITEM, which ensures the existence of a specific user in an external table to verify that the user has, for example, special authority

6 Command Features (continued) CL command Reject or Allow with or without modifications may initiate alerts by , Syslog, Tweeter, etc. Replace, prior to execution, an element, a qualifier, an entire parameter or the CL command itself. Extensive log with a full Report Generator produces HTML and PDF reports and sends them by . Command has been designed and implemented based upon specific customer requests for a “total” control and monitoring solution. Comprehensive modification with DFTPRM, OMTPRM,… Ability for central management of multi-LPAR environment

7 Summary of Unique Command Features Support for command qualifiers Support for command elements Support for displaying lists of elements Integrated Help System command prompt Use of Groups (useful to compare to user who has Limited Capabilities, some special authority, has a GRPPRF (even if it is supplemental)

8 Command Main Screen; Select Option 1

Work with Command Rules; Select a Rule (1)

Select a Command Rule

Work with a Command Rule

Filter Conditions

Replace Values

Message to Send and F7=Replacement Fields

Modify Alert

Edit Action Script

Activate/Deactivate Commands

Main Menu; Select Option 42, Command Log

Display Parameters

Display Command Log

F10=Message

F11=Single Entry

Main Menu; Select Option 81, System Configuration

Select Option 31, Command General Definitions

Command General Definitions

26 Thank You Please visit us at