Avoid potential problems
Before installing or upgrading Security Verify Access, review the product requirements:
After installing Security Verify Access, make a comprehensive backup and system recovery strategy. When creating the backup and recovery strategy:
- Supported operating system levels
- Prerequisite software requirements
- Required software patches
- Minimum memory requirements
- Disk space requirements
- Periodically back up the user registry.
- Maintain information about the environment, including system topology, IP addresses, host names, and which components are installed on each system.
- Maintain updated information describing the key system resources and security policies managed by ISAM.
- Periodically check that all systems running Security Verify Access have sufficient disk space for runtime and problem determination data. As the number of security policy grows, and the number of users, groups, and protected objects increase, the space requirements for the policy databases, message logs, trace logs, and any auditing information will also increase.
- Regularly check for the availability of fix packs and install them as they become available. Information about fix packs and other useful information can be found on the IBM Software Support Site.
Parent topic: Getting started with troubleshooting