Q
Manage Learn to apply best practices and optimize your operations.

Track user activities

I know I can track file updates using file journaling in iSeries, but with hundreds of data files this becomes exhaustive. Is there anyway to track user activities on files while they are using SQL?

Well... This is one of those "it depends" questions. You have several options but I'm not sure that any of them will narrow down the information to just the information you're looking for. Here are some of your options:

- OS/400 auditing allows you to audit the use of a file. You can audit all reads and changes or changes only. You can narrow this down to only auditing a few users' change activities if you want. However, I'm not sure this will give you all of the information you're looking for.

- You could use a trigger program and only fire it or log information in specified cases. But depending on how you do this, performance could be adversely affected.

- You could use an exit program and log the requests coming through that way. If you wanted to parse the incoming string, you could be selective on what is logged and log only specific files and/or users.

==================================
MORE INFORMATION ON THIS TOPIC
==================================

The Best Web Links: Tips, tutorials and more.

Search400's targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Read this Search400 Featured Topic: Secure your iSeries


This was last published in August 2002

Dig Deeper on iSeries system and application security

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close