AIX security reporting

Monthly policy reports

From the developerWorks archives

David Tansley

Date archived: December 19, 2016 | First published: September 03, 2012

Generating IBM® AIX® security reports should reflect the current security model overview of your system, and these reports can then be presented to managers or audit to show how your AIX system is managed with regards to security. In this article, I will demonstrate what type of attributes could be collected and why.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.

Zone=AIX and UNIX
ArticleTitle=AIX security reporting