SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
        Server Configuration Files >>
        Defining Subconfigurations >>
        Configuring Ciphers and MACs >>
        Configuring Root Logins
        Restricting User Logins
        Defining Subsystems
        Auditing
            Configuring Logging in sshd2
            Logging SFTP Transactions
            SMF Auditing
        Securing the Server >>
    Authentication >>
    File Transfer Using SFTP >>
    Secure File Transfer Using Transparent FTP Security >>
    Tunneling >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Man Pages and Default Configuration Files >>
    Log Messages >>

Auditing

SSH Tectia Server for IBM z/OS logs events with syslog. Logging (auditing) is very important for security. You should check the logs often, or use tools to analyze them. From the logs, you can see whether unauthorized access has been attempted, and take further action if needed. For example, you could add the hosts from which the attempts have been made to DenyHosts, or drop the packets from the domain completely at your firewall.

Configuring Logging in sshd2

Logging SFTP Transactions

SMF Auditing

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2011 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice