- The structure of the Compliance Node was updated from:
- The Central Administration was adjusted to native from:
- Output Fields per File > Fields to ignore – a bug fix where in cases where there was a single field, it was presented as a Not Checked field.
- Adjustment was made to the native (“green”) program.
When the screens are compressed, a call was added to the native program to make them available.
- Also, a test was added for existence of member to enable more accurate message when screens are not found.
Authority on Demand (AOD)
- Active jobs – Node is properly assigned now to Authority on Demand™ (AOD).
Scheduler for Firewall/Audit/AP‐Journal
- Bug fix regarding the synchronization between the GUI and IBM’s prompter.
User input was saved incorrectly.
- Bug fix regarding authority of the Change‐Tracker module – If library
SMZTwas missing, Anti‐Virus module’s menu option did not show on the iSecurity™ Navigator Window’s Menu tree.
Audit Real Time Detection Rules and Queries and Reports
- A warning message for empty filter, in Audit (and other applications) Queries and
Reports and was added.
For computability reasons (with the native/”green” version), two (2) changes were
made to the iSecurity™ Navigator Window:
- In the Authority on Demand (AOD) menu item, and
- In the Queries and Reports menu item.
Authority on Demand (AOD)
Instead of the old Authority on Demand Log menu item, now there is a Log menu item which presents three (3) sub‐menu items:
- The old Authority On Demand Log menu item,
- Two (2) new Print Log menu items:
- i. Print Log + Attachments
- ii. Print Log + Entered Commands
Queries and Reports
In the Queries and Reports menu item, under the Queries sub‐menu item, an Authority on Demand Queries was added.
In the Visualizer Business Intelligence products, both Audit and Firewall (and other applications as well), instead of the old Tab management system, now there is a new button ( > ) in the Tools Menu.
When clicked upon, it opens a drop‐down list box allowing selection of the Active Tab.
To save time on searching for the specific Tab name:
Once in the list box’s search bar (marked with yellow in the screen capture below), the user may type the letters included in the required Tab Name.
As a result, the list of Tabs will minimize to present the Tab Names which include
The new button in the Tools Menu:
The new drop‐down list box:
- The default for command output was adjusted to native.
Journal Application Definitions
- Adjusted to native with support for IASP, Auto Backup older data and Exit program (after filter).
- Added verification of journal when editing an application or a report.
User profile Report in Visualizer Business Intelligence
- ● Drill‐down feature extended to support:
$A, $B, $C, $D, $G, $P, $Qqueries types.
Compliance – Run Plan
- Adjustment to native changes.
The Excel output file was created with a name other than GUI requested.
- Updated to display GUI only specific content.
Visualizer™ Business Intelligence
- The constant String
**No value**is displayed now as
- Session Properties now includes a list of installed modules, found in the Versions tab.
- In Scheduler for Audit, Firewall and AP‐Journal, the list of commands for a report
was adjusted to native.
- A new ‘Type’ column has been added to the Report/Application definitions, in the Application definition tree.
Editing Report or Application Definitions
NOTE: This can be done with Report/Application definitions that are not enabled.
- The AP‐Journal can now be modified, while the user can switch between the two ‘Types’.
- When editing a file that belongs to a Report, only the Filters dialogue box is available.
- When editing a file that belongs to an Application, only the filter and alerts are available.
New Application Wizard
Report creation was added.
Application Output – Containers
Subsets which required the native command
DSPAPJRN to be supplied as a PTF have been fixed.
A modification to enable work with large amount of users was added.
The Members table displays initially only included members.
The ‘Add’ button now prompts for multiple user additions.
By unchecking a checkbox, a user will be removed from the group.
Same table is available when editing all aspects of the group.
- Users and Groups – The Group Security table is now sorted by checked members.
Visualizer Business Intelligence for Audit and Firewall
- An initial time filter was added –
'By last n days'.It is set as the default option.
Firewall/Audit New Query Wizard
- Firewall/Audit New Query – when selected output format is
'Textual Description'the output fields page is not displayed.
- Firewall/Audit Edit Query – when selected output format is
'Textual Description'the output fields tab although displayed, allows for empty selectionof output fields.
- Bug fix for error that is caused due the previous addition of output fields length.
In Audit Query (as well as other applications), the default
'From time' and
'To time' for Run Query for most products was adjusted to native side. Default time covers 24 hours a day.
Next to the time controls there is now a link that allows for convenient reset of the time to that default.
- In Audit Query, the users can now browse
“Type of access”by Field or Value, using textual or numeric code.
- IFS Security ensures upper‐case only for file system and directory names.
- In Queries, the ability to edit output fields’ length was added.
Copy IFS file to PC
- A possible fix for rare cases of ‘Sharing violation’ was added when attempting to
access an IFS file.
Workspace Location Prompt
- This feature is part of iSecurity GUI version 4.7.10. It enables ease of selection of user’s workspace.
This feature is useful mainly for shared environments where the same installation is used simultaneously by two or more users.
Each can set his own private accessible location without blocking other members.
NOTE: There is a slight difference between new installations and existing installations that perform an update.
New Installation Scenario
When the GUI starts, the Workspace Launcher screen is the workspace location prompt.
Historically, Raz‐Lee used
isecurity_workspace3 located in the user’s home directory – that is the initial location.
Users can browse or type to select a different directory.
If the location specified does not exist, the system will make an attempt to create it.
The prompt is displayed each time the GUI starts unless the ‘
workspace as the default and do not ask again' button is
The prompt will display if the system is unable to set the requested location.
Access per Instance
Access per Instance, as the next step following setup of the location, is to lock it to ensure access by a single instance only.
If this step fails, the application will terminate.
Failure to lock a default location will pop up the following error message:
"Could not launch the product because the associated workspace is currently in use by another application,
or is either invalid or read-only. Application will exit.
Would you like to delete default location?".
The user has the option to delete the default location, causing the location prompt to display at the next application restart.
Activating the GUI™ for the first time following an update, the system tries to set the previous workspace location.
- If accomplished successfully, the GUI will show as usual but the location is saved and upon next restart the prompt will show pointing to last workspace used.
- If failed to set the location, the location prompt will display just as it does for a new installation.
Setting the prompt from within the application
This can be set also from the Preferences window – This is a global preferences that effects the installation itself rather than the workspace and thus useful mainly for use in a single user scenario.
The Audit Settings was adjusted to match the native (“green‐screen”) options, including support for the latest OS/400™ releases:
*SECURITY– Security related events
|*SECCFG– Security configuration is audited
|*SECDIRSRV– Changes done by directory service functions
|*SECIPC– Changes to inter‐process communications
|*SECNAS– Network authentication service actions
|*SECRUN– Security run tine functions
Queries and Reports>QueriesAudit Queries – Support for
$H audit types was added, with a dedicated
'initial object selection' screen.
Authority on Demand (AOD)
Authority on Demand (AOD) log support was enhanced to match native (“greenscreen”) options.
In addition, the constant
CMDNOTPGM was changed to
CMDAODINT to solve a Trace
The Firewall – IFS Security directory subtree settings for generic names (new in native) was added.
Adding and Editing Queries was adjusted to native; not more than 100 fields can be selected for output and sort.
Visualizer™ Business Intelligence
- Assorted improvements and bug fixes for Visualizer Business Intelligence.
- Cache feature is commented as per this release.
Visualizer Business Intelligence operation might situate substantial load on the memory of the PC.
- Bug fix – When set to Collect latest data on start, the initial query that is executed when activating Visualizer™ Business Intelligence ran twice.
- Visualizer Settings – Selection of date intervals in various screens – the initial interval uses dynamic instead of absolute dates.
In Control Message Queues users can now work with any
CCSID that maps the
@ character to a different symbol.
In Firewall>Users and Groups node, in Application Groups, Location Groups, and User Groups, users can now work with any CCSID that maps the
# characters to a different symbol.
Visualizer Business Intelligence
In Drill to Log from Firewall, date values are now displayed correctly.