Implementing system security recommendations

 

Use this procedure to implement security on System i™.

To protect assets stored on the system, Sampson Organic Produce used the IBM® eServer™ Security Planner, an interactive planning tool that creates a dynamic set of recommendations based on the system environment. You can use the security recommendations that the administrator for Sampson Organic Produce generated from the Security Planner as an example for implementing your own security settings.

To implement security on System A...

  1. In iSeries™ Navigator, expand System A. Right-click Security and select Configure.

  2. On the Welcome page, click Next.

  3. Select Average to describe your general security policy. Click Next.

  4. Select Running business applications to describe how your system will be used. Click Next.

  5. Select No and click Next.

  6. Select No for your Advanced Program-to-Program Communication (APPC) use and click Next.

  7. Select No to indicate that you are not connecting to the Internet and click Next.

  8. Select No and click Next.

  9. Select No to indicate that you are not using IBM iSeries NetServer™. Click Next.

  10. Select No and click Next twice.

  11. Select Yes to audit security-related actions on the system. Click Next.

  12. Select Yes to schedule reports to monitor security on the system. Click Next.

  13. Select Once a month for scheduling these reports. Click Next.

  14. To review the security recommendations, click Details. You can change the security values by clearing the appropriate security control. Click OK. Then click Next.

  15. Specify the directory in which you would like to store the Administrator and User Information Reports. Click Next. You can review each of these reports.

  16. Click Next again.

  17. Select Yes, make changes now and click Finish. You have now completed security configuration on System A.

 

Parent topic:

Scenario: Setting up System i to communicate with LAN
Previous topic: Securing your system