Download presentation
Presentation is loading. Please wait.
Published byAmberlynn Dennis Modified over 9 years ago
1
1 Action Automated Security Breach Reporting and Corrections
2
2 Action Features Integrated Intrusion Detection System (IDS) that includes alarms and protective response mechanisms Identification of Security Breaches and Intrusions with automatic, immediate warning notifications Simple, intuitive mechanism for defining data security events, critical events, with the ability to define and locate all events on the server Activation of automatic, immediate responses to security events, Audit Log registry events, computer status according to WRKSYSSTS and WRKACTJOB, messages in QSYSOPR and MSGQ CL Command Generator to define corrective response measures, which enables user blocking, repeat entry blocking, application activation, changing of file names, etc.
3
3 iSecurity Action: Real-Time Alert handling in iSecurity Real-Time Alerts QAUDJRN (Audit) Network Security (Firewall) Critical OS messages (QSYSOPR/ QSYSMSG) Database Journals (AP Journal) Authority changes (Authority on Demand) Execute CL Scripts Send e-mail Write to MSGQ Write to Syslog Send SMS * Action can do all of the above
4
4 Sample Action Responses (green screen)
5
5 Action Command Script: Initiate Capture, Change User Profile, End Job
6
6 Real-Time Detection Rules
7
7 Edit Rule and Specify Action
8
8 Working with Actions
9
9 Please visit us at www.razlee.com Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.