Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server.
Download this podcast to learn about:
- Identifying escalated privilege attacks on the IBM i
- Determining the true level of authority of a user profile
- Controlling and monitoring administrative level users
- Setting email alerts to include critical job and security information