Auditing doesn't need to be scary if you have the right tools.
By Carol Woodbury
We seem to be getting a lot of questions about i5/OS auditing functions lately. I'm guessing it's because several laws and regulations either require or strongly suggest that certain activity and file accesses be "logged." Logging in the i5/OS and "i" world is known as "auditing." So I thought I'd answer some of the questions we're receiving.