Network Reports
In today's world, there are hundreds of ways to access your data without respect to traditional menu security, making a security breach more likely than ever. Because the majority of security breaches happen by accident and from within your company, it's important to check network activity to see who is accessing data on your system through network access servers like FTP, ODBC, and TELNET.
Powertech Compliance Monitor for IBM i provides the following predefined Network reports:
- All Exit Point Information: Provides information about all registered exit points on the system.
- All Exit Program Information: Provides information about all registered exit programs on the system.
- Network Security Exit Points: Provides information about exit points used to monitor and control network access.
- Network Security Exit Programs: Provides information about exit programs used to monitor and control network access.