Configuring DSMs
IBM AS/400 iSeries
133
The execution of the setup function sets a default start date and time for data
collection from the Audit Journal to 08:00:00 of the current day.
NOTE
To preserve your previous start date and time information for a previous
installation you must run
AJLIB/DATETIME.
Record the previous start date and
time and type those values when you execute
AJLIB/SETUP
. The start date and
time must contain a valid date and time in the six character system date and
system time format. The end date and time must be a valid date and time or left
blank.
Step 7
Execute
AJLIB/DATETIME.
This updates the IBM AS/400 iSeries with the data collection start date and time if
you made changes.
Step 8
Execute
AJLIB/AUDITJRN.
This launches the Audit Journal Collection program to gather and send the records
to your remote FTP server: If the transfer to the FTP server fails, a message is sent
to QSYSOPR. The process for launching
AJLIB/AUDITJRN
is typically automated
by an iSeries Job Scheduler to collect records periodically.
NOTE
If the FTP transfer is successful, the current data and time information is written
into the start time for
AJLIB/DATETIME
to update the gather time and the end
time is set to blank. If the FTP transfer fails, the export file is erased and no
updates are made to the gather date or time.
Pulling Data Using Log File Protocol
You are now ready to configure the log source and protocol within SIEM:
Step 1
To configure SIEM to receive events from an IBM AS/400 iSeries, you must select
the
IBM AS/400 iSeries
option from the
Log Source Type
drop-down list box.
Step 2
To configure the log file protocol for the IBM AS/400 iSeries DSM, you must select
the
Log File
option from the
Protocol Configuration
drop-down list box and
define the location of your FTP server connection settings.
NOTE
If you are using the PowerTech Interact or LogAgent for System i software to
collect CEF formatted syslog messages, you must select the
Syslog
option from
the
Protocol Configuration
drop-down list box.
Step 3
We recommend when you use the Log File protocol option that you select a secure
protocol for transferring files, such as Secure File Transfer Protocol (SFTP).
For more information on configuring log sources and protocols, see the
Log
Sources User Guide
.
Configuring Raz-Lee
iSecurity
The Raz-Lee iSecurity for System i user interface allows detailed security audits of
systems for compliance and securing iSeries infrastructure. You can integrate
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......