AIX security reporting
Monthly policy reports
From the developerWorks archives
Date archived: December 19, 2016 | First published: September 03, 2012
Generating IBM® AIX® security reports should reflect the current security model overview of your system, and these reports can then be presented to managers or audit to show how your AIX system is managed with regards to security. In this article, I will demonstrate what type of attributes could be collected and why.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.