Orb Data

Orb Data's Blog Site

AIX Security Compliance Audit

AIX Security Configuration Audit – Remediate Security Failures

Following on from my previous blog on how to quickly perform a AIX security configuration audit, I thought I would take a look at how to remediate some of the security failures that the audit detected. The remediation will be done using the IBM Endpoint Manager Security Configuration Module. So if we use the same […]

, , , ,

AIX Security Configuration Audit – “I need a compliance report ASAP!”

How often does your IT Security team ask you to run a “quick” security compliance audit on your AIX server infrastructure? If you are going to do this manually for a significant number of servers this would require a significant amount of manpower and a considerable amount of time to complete. Wouldn’t it be nice […]

, , , ,