IBM i Security Intrusion Detection Template
Tested OS Versions:
The IBM i Security Intrusion Detection template has been tested on:
- V7R1
- V7R2
- V7R3
IBM i Security Intrusion Detection Controls
The following table shows the IBM i audit entry, condition, action and sub-action on which the template can be used to control the information that is received and actioned in your security schema.
Action |
Subaction |
Journal Entry |
Condition |
Description |
Threat Evidence |
Attack Detection |
IM |
Probe Type ID in (ATTACK, XATTACK) |
Attack action detected event or possible extrusion attack |
Threat Evidence |
Scan Detection |
IM |
Probe Type ID in (SCANE, SCANG, XSCAN) |
Scan event action detected event, or Scan global action detected event or Outbound scan event detected |
Threat Evidence | TCP Connection | IM |
Probe Type ID in (TR-TCP, XTRTCP) |
Traffic Regulation action detected event over TCP or Outbound TR detected event (TCP) |
Threat Eveidence | UDP Cpnnection | IM | Probe Type ID in (TR-UDP, XTRUDP) | Traffic Regulation action detected event over UDP or Outbound TR detected event (UDP) |