SlideShare ist ein Scribd-Unternehmen logo
1 von 43
The Truth About Viruses on IBM i
2
Your Presenters
ROBIN TATAM
Director of Security Technologies
robin.tatam@helpsystems.com
SANDI MOORE
Senior Technical Consultant
sandi.moore@helpsystems.com
3
Today’s Objectives
• Viruses and the Integrated File System
• Power System and Windows Viruses
• Prevention and Protection
• PC-Based Scanning vs. Native IBM i Scanning
• Some Myths and Facts
4
What Is the Integrated File System?
5
Integrated File System Relating to Viruses
• QDLS
• Root (/)
• QOpenSys
• UDFS
• QNTC
6
How Viruses Get into the IFS
7
How Viruses Get into the IFS
• Mapped drives
8
How Viruses Get into the IFS
• Mapped drives
9
How Viruses Get into the IFS
• Mapped drives
10
How Viruses Get into the IFS
• Mapped drives
11
How Viruses Get into the IFS
• Mapped drives
12
How Viruses Get into the IFS
• FTP
13
How Viruses Get into the IFS
• FTP
14
How Viruses Get into the IFS
• FTP
15
How Viruses Get into the IFS
• Image catalogs
• NFS mounts
• UDFS mounts
16
How Viruses Get into the IFS
• Client access
17
How Viruses Get into the IFS
• Web servers
18
How Viruses Get into the IFS
• Internet downloads
• Removable media
• Internet browsing
• Laptops or wireless devices
• Email
• VPNs
• File sharing
19
Can Windows Viruses Affect IBM i?
Fact: Viruses cannot hide inside RPG and CL programs.
Fact: Viruses cannot hide inside physical and logical files.
Fact: IBM i cannot run .exe files that contain viruses.
Fact: Viruses can hide inside Java and Unix stream files.
Fact: IBM i can run Java and UNIX executables.
20
Can Windows Viruses Affect IBM i?
• Malicious programs
21
Can Windows Viruses Affect IBM i?
• Malicious programs
22
Can Windows Viruses Affect IBM i?
• Malicious programs
23
Can Windows Viruses Affect IBM i?
• Denial of Service (DOS) attack
24
What’s at Risk?
• Operating System
25
What’s at Risk?
• Operating System
26
What’s at Risk?
• Operating System
27
Virus Protection on the Power System
TCP/IP
Websphere
IBM i Client
Access
Operations
Navigator
Growing Number
of IBM i
Applications
Domino
MQ Series
28
Security Measures That Won’t Protect
• Mail scanning
• Virus scanning on clients
• Firewalls
29
Virus Protection on the Power System
• Implement and enforce security policies
• Shut down unused services
• Avoid oversharing
• Scan for viruses regularly
• Use exit programs to restrict access to servers
• Enable auditing
• Monitor so you will know right away
• Get good backups
30
Virus Scanning from a PC
• Dedicate a PC for scanning
• Map a drive to Root with *ALLOBJ
• Physically secure the PC
• Ensure PC has internet access
• Scan the PC daily
• Automate monitoring of the PC
• Follow IBM’s procedures
31
Virus Scanning from a PC
IBM’s Recommendations
Step 1: To end all Netserver and File Server jobs, run the following commands:
ENDPJ SBS(QSERVER) PGM(QSYS/QZLSFILE) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSO) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSS) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVS2) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP0) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP1) OPTION(*IMMED)
ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP2) OPTION(*IMMED)
Step 2: Change the QZLSFILE prestart job description to allow only one Netserver job to start and then start that job:
CHGPJE SBSD(QSERVER) +
PGM(QSYS/QZLSFILE) INLJOBS(1) THRESHOLD(1) ADLJOBS(0)
STRPJ SBS(QSERVER) PGM(QSYS/QZLSFILE)
32
Virus Scanning from a PC
Step 3: Perform the Scan. The user who will be doing the scan should map a network drive to the Power System.
Step 4: Change the NetServer prestart job back:
CHGPJE SBSD(QSERVER) +
PGM(QSYS/QZLSFILE) INLJOBS(1) THRESHOLD(1) ADLJOBS(5)
Step 5: Restart the Netserver and File Server Host Server jobs by running the following commands:
STRPJ SBS(QSERVER) PGM(QSYS/QZLSFILE)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSO)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSS)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVS2)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP0)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP1)
STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP2)
33
Virus Scanning from a PC
• Security concerns
• Leaving a PC signed on with full authority
• Confidential data is visible
• PC can infect the IFS
34
Virus Scanning from a PC
• Reliabilty/Stability concerns
• Parts of IFS cannot be scanned
• Scanning process can stop entirely
• PC scanning is manual process
35
Virus Scanning from a PC
• Performance concerns
• Increased network load
• Unable to use SAVCHGOBJ after scanning
• Backups take longer
• Very slow
36
Native IBM i Virus Scanning
• Secure
• Reliable
• Stable
• Optimized performance
37
Native IBM i Virus Scanning
• Security enabled
• Does not require *ALLOBJ
• No data is transferred
• Not Windows-based!
38
Native IBM i Virus Scanning
• Reliable/Stable
• Automated
• No additional hardware
• Easily monitored
• Can scan all files
• Can detect and remove threats
39
Native IBM i Virus Scanning
• Performance optimized
• Does not increase network load
• Does not reset a file’s “Last Access Time”
• Allows scanning more frequently
• Very fast!
40
Myths and Facts
Myth: We don’t use the IFS.
Fact: Most modern applications and protocols use the IFS extensively.
Myth: The Power System cannot get a virus.
Fact: Viruses can hide inside Java and Unix files and IBM i can execute
them.
Myth: Viruses can’t attack the IBM i architecture.
Fact: Anything an administrator can do, a virus can do.
41
Myths and Facts
Myth: Our Power System isn’t connected to the internet.
Fact: The cable doesn’t have to be physically connected. The Power
System isn’t an island if it’s on the network.
Myth: Our firewall protects us from viruses.
Fact: There is no single solution on any platform that gives you
protection, including firewalls.
Myth: I can scan the Power System with my PC virus scanner.
Fact: PC-based solutions can be used but they may miss files, require a
manual process, and open many security holes.
42
Questions?
43
Thanks for your time!
800-328-1000
info.powertech@helpsystems.com
www.helpsystems.com/powertech

Weitere ähnliche Inhalte

Was ist angesagt?

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCsw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCanSecWest
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldCodiax
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101Mona Arkhipova
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise247infotech
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?Michael Boelen
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security
 
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...Nicolas Fränkel
 
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...Nicolas Fränkel
 
Network Security Through FIREWALL
Network Security Through FIREWALLNetwork Security Through FIREWALL
Network Security Through FIREWALLTheCreativedev Blog
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system UrmilasSrinivasan
 
QIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team storyQIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team storyMona Arkhipova
 
Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2PacSecJP
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Byres Security Inc.
 
[CB19] Hardware Wallet Security
[CB19] Hardware Wallet Security[CB19] Hardware Wallet Security
[CB19] Hardware Wallet SecurityCODE BLUE
 
Final project
Final projectFinal project
Final projectrippea
 

Was ist angesagt? (20)

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCsw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelisting
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101
 
Abdulkarim 1 and 2
Abdulkarim 1 and 2Abdulkarim 1 and 2
Abdulkarim 1 and 2
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
Code Europe PL - Securing the JVM: Neither for fun nor for profit, but do you...
 
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
Voxxed Days Athens - Securing the JVM - Neither for fun nor for profit, but d...
 
Network Security Through FIREWALL
Network Security Through FIREWALLNetwork Security Through FIREWALL
Network Security Through FIREWALL
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
 
QIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team storyQIWI SOC benchmarking: Blue Team story
QIWI SOC benchmarking: Blue Team story
 
Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2Yunusov babin 7 sins pres atm v2
Yunusov babin 7 sins pres atm v2
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 
Firewall
FirewallFirewall
Firewall
 
[CB19] Hardware Wallet Security
[CB19] Hardware Wallet Security[CB19] Hardware Wallet Security
[CB19] Hardware Wallet Security
 
Hacker tool talk: kismet
Hacker tool talk:  kismetHacker tool talk:  kismet
Hacker tool talk: kismet
 
Final project
Final projectFinal project
Final project
 

Andere mochten auch

Anticoncepci+¦n y +®tica, sexualidad humana y bio+®tica
Anticoncepci+¦n y +®tica, sexualidad humana y bio+®ticaAnticoncepci+¦n y +®tica, sexualidad humana y bio+®tica
Anticoncepci+¦n y +®tica, sexualidad humana y bio+®ticaMajoRGarcia
 
Anticoncepción y ética, sexualidad humana y bioética
Anticoncepción y ética, sexualidad humana y bioéticaAnticoncepción y ética, sexualidad humana y bioética
Anticoncepción y ética, sexualidad humana y bioéticadaanzaam
 
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. Services
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. ServicesVersteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. Services
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. ServicesBeck et al. GmbH
 
AiTi Education Profile
AiTi Education ProfileAiTi Education Profile
AiTi Education ProfileAiTi Education
 

Andere mochten auch (6)

Anticoncepci+¦n y +®tica, sexualidad humana y bio+®tica
Anticoncepci+¦n y +®tica, sexualidad humana y bio+®ticaAnticoncepci+¦n y +®tica, sexualidad humana y bio+®tica
Anticoncepci+¦n y +®tica, sexualidad humana y bio+®tica
 
Beth_Resume_(1)[1]
Beth_Resume_(1)[1]Beth_Resume_(1)[1]
Beth_Resume_(1)[1]
 
Anticoncepción y ética, sexualidad humana y bioética
Anticoncepción y ética, sexualidad humana y bioéticaAnticoncepción y ética, sexualidad humana y bioética
Anticoncepción y ética, sexualidad humana y bioética
 
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. Services
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. ServicesVersteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. Services
Versteckte Akzeptanzkiller. Webinar 4 der Webinarreihe von Beck et al. Services
 
executive coach ICC
executive coach ICCexecutive coach ICC
executive coach ICC
 
AiTi Education Profile
AiTi Education ProfileAiTi Education Profile
AiTi Education Profile
 

Ähnlich wie The Truth About Viruses on IBM i

Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017FRSecure
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5FRSecure
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechHelpSystems
 
1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptxnguyenthanhdatpl403
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and VirusesWasif Ali Syed
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy codeG Prachi
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLiphonepentest
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsRiscure
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationPrecisely
 

Ähnlich wie The Truth About Viruses on IBM i (20)

Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Virusppt
ViruspptVirusppt
Virusppt
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KLBreaking Secure Mobile Applications - Hack In The Box 2014 KL
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis Protocols
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security Configuration
 

Mehr von HelpSystems

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020HelpSystems
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...HelpSystems
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar HelpSystems
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos HelpSystems
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsHelpSystems
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de ITHelpSystems
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3HelpSystems
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPAHelpSystems
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3HelpSystems
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2HelpSystems
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1HelpSystems
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringHelpSystems
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudarHelpSystems
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tourHelpSystems
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...HelpSystems
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scriptsHelpSystems
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanHelpSystems
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security ScanHelpSystems
 

Mehr von HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Kürzlich hochgeladen

Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Gáspár Nagy
 
Sinoville Clinic ](+27832195400*)[🏥Abortion Pill Prices Sinoville ● Women's A...
Sinoville Clinic ](+27832195400*)[🏥Abortion Pill Prices Sinoville ● Women's A...Sinoville Clinic ](+27832195400*)[🏥Abortion Pill Prices Sinoville ● Women's A...
Sinoville Clinic ](+27832195400*)[🏥Abortion Pill Prices Sinoville ● Women's A...Abortion Clinic
 
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
^Clinic ^%[+27788225528*Abortion Pills For Sale In sowetokasambamuno
 
From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIInflectra
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Andrea Goulet
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Soroosh Khodami
 
Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14VMware Tanzu
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAShane Coughlan
 
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanWorkshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanNeo4j
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfICS
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksJinanKordab
 
Jax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckJax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckMarc Lester
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationElement34
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletAndrea Goulet
 
Food Delivery Business App Development Guide 2024
Food Delivery Business App Development Guide 2024Food Delivery Business App Development Guide 2024
Food Delivery Business App Development Guide 2024Chirag Panchal
 
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...CloudMetic
 
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
Auto Affiliate  AI Earns First Commission in 3 Hours..pdfAuto Affiliate  AI Earns First Commission in 3 Hours..pdf
Auto Affiliate AI Earns First Commission in 3 Hours..pdfSelfMade bd
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Eraconfluent
 
^Clinic ^%[+27788225528*Abortion Pills For Sale In witbank
^Clinic ^%[+27788225528*Abortion Pills For Sale In witbank^Clinic ^%[+27788225528*Abortion Pills For Sale In witbank
^Clinic ^%[+27788225528*Abortion Pills For Sale In witbankkasambamuno
 

Kürzlich hochgeladen (20)

Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
Sinoville Clinic ](+27832195400*)[🏥Abortion Pill Prices Sinoville ● Women's A...
Sinoville Clinic ](+27832195400*)[🏥Abortion Pill Prices Sinoville ● Women's A...Sinoville Clinic ](+27832195400*)[🏥Abortion Pill Prices Sinoville ● Women's A...
Sinoville Clinic ](+27832195400*)[🏥Abortion Pill Prices Sinoville ● Women's A...
 
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
 
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
^Clinic ^%[+27788225528*Abortion Pills For Sale In soweto
 
From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST API
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024
 
Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
 
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanWorkshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with Links
 
Jax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckJax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined Deck
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test Automation
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea Goulet
 
Food Delivery Business App Development Guide 2024
Food Delivery Business App Development Guide 2024Food Delivery Business App Development Guide 2024
Food Delivery Business App Development Guide 2024
 
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
 
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
Auto Affiliate  AI Earns First Commission in 3 Hours..pdfAuto Affiliate  AI Earns First Commission in 3 Hours..pdf
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
^Clinic ^%[+27788225528*Abortion Pills For Sale In witbank
^Clinic ^%[+27788225528*Abortion Pills For Sale In witbank^Clinic ^%[+27788225528*Abortion Pills For Sale In witbank
^Clinic ^%[+27788225528*Abortion Pills For Sale In witbank
 

The Truth About Viruses on IBM i

  • 1. The Truth About Viruses on IBM i
  • 2. 2 Your Presenters ROBIN TATAM Director of Security Technologies robin.tatam@helpsystems.com SANDI MOORE Senior Technical Consultant sandi.moore@helpsystems.com
  • 3. 3 Today’s Objectives • Viruses and the Integrated File System • Power System and Windows Viruses • Prevention and Protection • PC-Based Scanning vs. Native IBM i Scanning • Some Myths and Facts
  • 4. 4 What Is the Integrated File System?
  • 5. 5 Integrated File System Relating to Viruses • QDLS • Root (/) • QOpenSys • UDFS • QNTC
  • 6. 6 How Viruses Get into the IFS
  • 7. 7 How Viruses Get into the IFS • Mapped drives
  • 8. 8 How Viruses Get into the IFS • Mapped drives
  • 9. 9 How Viruses Get into the IFS • Mapped drives
  • 10. 10 How Viruses Get into the IFS • Mapped drives
  • 11. 11 How Viruses Get into the IFS • Mapped drives
  • 12. 12 How Viruses Get into the IFS • FTP
  • 13. 13 How Viruses Get into the IFS • FTP
  • 14. 14 How Viruses Get into the IFS • FTP
  • 15. 15 How Viruses Get into the IFS • Image catalogs • NFS mounts • UDFS mounts
  • 16. 16 How Viruses Get into the IFS • Client access
  • 17. 17 How Viruses Get into the IFS • Web servers
  • 18. 18 How Viruses Get into the IFS • Internet downloads • Removable media • Internet browsing • Laptops or wireless devices • Email • VPNs • File sharing
  • 19. 19 Can Windows Viruses Affect IBM i? Fact: Viruses cannot hide inside RPG and CL programs. Fact: Viruses cannot hide inside physical and logical files. Fact: IBM i cannot run .exe files that contain viruses. Fact: Viruses can hide inside Java and Unix stream files. Fact: IBM i can run Java and UNIX executables.
  • 20. 20 Can Windows Viruses Affect IBM i? • Malicious programs
  • 21. 21 Can Windows Viruses Affect IBM i? • Malicious programs
  • 22. 22 Can Windows Viruses Affect IBM i? • Malicious programs
  • 23. 23 Can Windows Viruses Affect IBM i? • Denial of Service (DOS) attack
  • 24. 24 What’s at Risk? • Operating System
  • 25. 25 What’s at Risk? • Operating System
  • 26. 26 What’s at Risk? • Operating System
  • 27. 27 Virus Protection on the Power System TCP/IP Websphere IBM i Client Access Operations Navigator Growing Number of IBM i Applications Domino MQ Series
  • 28. 28 Security Measures That Won’t Protect • Mail scanning • Virus scanning on clients • Firewalls
  • 29. 29 Virus Protection on the Power System • Implement and enforce security policies • Shut down unused services • Avoid oversharing • Scan for viruses regularly • Use exit programs to restrict access to servers • Enable auditing • Monitor so you will know right away • Get good backups
  • 30. 30 Virus Scanning from a PC • Dedicate a PC for scanning • Map a drive to Root with *ALLOBJ • Physically secure the PC • Ensure PC has internet access • Scan the PC daily • Automate monitoring of the PC • Follow IBM’s procedures
  • 31. 31 Virus Scanning from a PC IBM’s Recommendations Step 1: To end all Netserver and File Server jobs, run the following commands: ENDPJ SBS(QSERVER) PGM(QSYS/QZLSFILE) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSO) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSS) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSERVS2) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP0) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP1) OPTION(*IMMED) ENDPJ SBS(QSERVER) PGM(QSYS/QPWFSTP2) OPTION(*IMMED) Step 2: Change the QZLSFILE prestart job description to allow only one Netserver job to start and then start that job: CHGPJE SBSD(QSERVER) + PGM(QSYS/QZLSFILE) INLJOBS(1) THRESHOLD(1) ADLJOBS(0) STRPJ SBS(QSERVER) PGM(QSYS/QZLSFILE)
  • 32. 32 Virus Scanning from a PC Step 3: Perform the Scan. The user who will be doing the scan should map a network drive to the Power System. Step 4: Change the NetServer prestart job back: CHGPJE SBSD(QSERVER) + PGM(QSYS/QZLSFILE) INLJOBS(1) THRESHOLD(1) ADLJOBS(5) Step 5: Restart the Netserver and File Server Host Server jobs by running the following commands: STRPJ SBS(QSERVER) PGM(QSYS/QZLSFILE) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSO) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVSS) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSERVS2) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP0) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP1) STRPJ SBS(QSERVER) PGM(QSYS/QPWFSTP2)
  • 33. 33 Virus Scanning from a PC • Security concerns • Leaving a PC signed on with full authority • Confidential data is visible • PC can infect the IFS
  • 34. 34 Virus Scanning from a PC • Reliabilty/Stability concerns • Parts of IFS cannot be scanned • Scanning process can stop entirely • PC scanning is manual process
  • 35. 35 Virus Scanning from a PC • Performance concerns • Increased network load • Unable to use SAVCHGOBJ after scanning • Backups take longer • Very slow
  • 36. 36 Native IBM i Virus Scanning • Secure • Reliable • Stable • Optimized performance
  • 37. 37 Native IBM i Virus Scanning • Security enabled • Does not require *ALLOBJ • No data is transferred • Not Windows-based!
  • 38. 38 Native IBM i Virus Scanning • Reliable/Stable • Automated • No additional hardware • Easily monitored • Can scan all files • Can detect and remove threats
  • 39. 39 Native IBM i Virus Scanning • Performance optimized • Does not increase network load • Does not reset a file’s “Last Access Time” • Allows scanning more frequently • Very fast!
  • 40. 40 Myths and Facts Myth: We don’t use the IFS. Fact: Most modern applications and protocols use the IFS extensively. Myth: The Power System cannot get a virus. Fact: Viruses can hide inside Java and Unix files and IBM i can execute them. Myth: Viruses can’t attack the IBM i architecture. Fact: Anything an administrator can do, a virus can do.
  • 41. 41 Myths and Facts Myth: Our Power System isn’t connected to the internet. Fact: The cable doesn’t have to be physically connected. The Power System isn’t an island if it’s on the network. Myth: Our firewall protects us from viruses. Fact: There is no single solution on any platform that gives you protection, including firewalls. Myth: I can scan the Power System with my PC virus scanner. Fact: PC-based solutions can be used but they may miss files, require a manual process, and open many security holes.
  • 43. 43 Thanks for your time! 800-328-1000 info.powertech@helpsystems.com www.helpsystems.com/powertech