Orb Data

Orb Data's Blog Site


AIX Security Configuration Audit – Remediate Security Failures

Following on from my previous blog on how to quickly perform a AIX security configuration audit, I thought I would take a look at how to remediate some of the security failures that the audit detected. The remediation will be done using the IBM Endpoint Manager Security Configuration Module. So if we use the same […]

, , , ,