Real-Time Protective Actions for iSeries Security
Software Version: 13
About this Manual
This user guide is intended for system administrators and security administrators responsible for the implementation and management of security on IBM i systems. However, any user with basic knowledge of IBM i operations will be able to make full use of this product after reading this book.
Raz-Lee takes customer satisfaction seriously. Our products are designed for ease of use by personnel at all skill levels, especially those with minimal IBM i experience. The documentation package includes a variety of materials to get you familiar with this software quickly and effectively.
This user guide, together with the iSecurity Installation Guide, is the only printed documentation necessary for understanding this product. It is available in HTML form as well as in user-friendly PDF format, which may be displayed or printed using Adobe Acrobat Reader version 6.0 or higher. If you do not have Acrobat Reader, you can download it from the Adobe website: http://www.adobe.com/. You can also read and print pages from the manual using any modern web browser.
This manual contains concise explanations of the various product features as well as step-by-step instructions for using and configuring the product.
Raz-Lee’s iSecurity is an integrated, state-of-the-art security solution for all System i servers, providing cutting-edge tools for managing all aspects of network access, data, and audit security. Its individual components work together transparently, providing comprehensive “out-of-the- box” security. To learn more about the iSecurity Suite, visit our website at http://www.razlee.com/.
The ActionUser Guide document was developed for users, system administrators and security administrators responsible for the implementation and management of security on IBM® AS/400 systems. However, any user with a basic knowledge of System i operations is able to make full use of this document following study of this User Guide.
NOTE: Deviations from IBM® standards are employed in certain circumstances in order to enhance clarity or when standard IBM® terminology conflicts with generally accepted industry conventions.
This document may also serve for new versions' upgrade approval by management.
Conventions Used in the Document
Menu options, field names, and function key names are written in Courier New Bold.
Links (internal or external) are emphasized with underline and blue color as follows: About this Manual.
Commands and system messages of IBM i® (OS/400®), are written in Bold Italic.
Key combinations are in Bold and separated by a dash, for example: Enter, Shift-Tab.
Emphasis is written in Bold.
A sequence of operations entered via the keyboard is marked as
STRACT > 81 > 32
meaning: Syslog definitions activated by typing STRACTand selecting option: 81 then option: 32.
Data Entry Screens
Data entry screens include many convenient features such as:
- Pop-up selection windows
- Convenient option prompts
- Easy-to-read descriptions and explanatory text for all parameters and options
- Search and filtering with generic text support
The following describes the different data entry screens.
- To enter data in a field, type the desired text and then press Enter or Field Exit
- To move from one field to another without changing the contents press Tab
- To view options for a data field together with an explanation, press F4
- To accept the data displayed on the screen and continue, press Enter
The following function keys may appear on data entry screens.
- F1: Help Display context-sensitive help
- F3: Exit End the current task and return to the screen or menu from which the task was initiated
- F4: Prompt Display a list of valid options for the current field or command. For certain data items, a pop-up selection window appears
- F6: Add New Create a new record or data item
- F8: Print Print the current report or data item
- F9: Retrieve Retrieve the previously-entered command
- F12: Cancel Return to the previous screen or menu without updating
This document is provided by Raz‐Lee Security for information purposes only and is not a legal binding document.
While Raz‐Lee is doing its best to coordinate between this document and Raz‐Lee's products, changes might occur. In case a change has been encountered, please inform Raz‐Lee. Raz‐Lee keeps its right to modify the software or the document as per its sole discretion Usage of this document, and all information (including product information) provided within, are subject to the following terms and conditions, and all applicable laws. If you do not agree with these terms, please do not access or use the remainder of this document.
This document contains highly confidential information, which is proprietary to Raz‐Lee Security Ltd. and/or its affiliates (hereafter, "Raz‐Lee"). No part of this document's contents may be used, copied, disclosed or conveyed to any third party in any manner whatsoever without prior written permission from Raz‐Lee. The information included in this document is intended for your knowledge and for negotiation purposes only. Raz‐Lee makes no implicit representations or warranties with respect to such information. The information included in this document is subject to change without notice. Any decision to rely on the information contained herein shall be at your sole responsibility, and Raz‐Lee will not accept any liability for your decision to use any information or for any damages resulting therefrom. Certain laws do not allow limitations on implied warranties or the exclusion or limitation of certain damages. If these laws apply to you, some or all of the above disclaimers, exclusions, or limitations may not apply to you.
All registered or unregistered trademarks, product names, logos and other service marks mentioned within this document are the property of Raz‐Lee or their respective owners. Nothing contained herein shall be construed as conferring by implication, estoppels, or otherwise any license or right, either express or implied, under any patent or trademark of Raz‐Lee or any third party. No use of any trademark may be made without the prior written authorization of Raz‐Lee. This document and all of its contents are protected intellectual property of Raz‐Lee. Any copying, reprinting, reuse, reproduction, adaptation, distribution or translation without the prior written permission of Raz‐Lee is prohibited.
Please check your End User License Agreement (EULA) for terms and Conditions.
2020 © Copyright Raz‐Lee Security Inc. All rights reserved.
Raz‐Lee Security Inc. www.razlee.com
Marketing: email@example.com 1‐888‐RAZLEE‐4 (1‐888‐7295334)
Support: firstname.lastname@example.org 1‐888‐RAZLEE‐2 (1‐888‐7295332)