Hey there, If you run an IBM i system—whether you still call it AS/400 or iSeries—you understand that keeping things secure isn’t optional. It’s your frontline defense against threats, compliance headaches, and those surprise audits that can derail your day.
IBM i is known for stability and security, but that does not mean it is automatically compliant or fully monitored. Auditing is what turns IBM i security from assumed to proven.

In this blog post, I’ll walk you through IBM i auditing in a straightforward, hands-on way. We’ll cover everything from the basics to setup, monitoring, and reports. Think of this as your go-to resource for IBM i security auditing, packed with tips to make your life easier. Let’s jump in!
You probably audit your finances or your team’s performance, right? System auditing works the same way—it tracks and records activities on your computer systems to spot issues, ensure compliance, and improve security. You log events like logins, file changes, or command executions to review later. This helps you catch unauthorized access, debug problems, or prove to regulators that you’re on top of things. In short, auditing gives you visibility into what happens on your system, so you stay proactive instead of reactive.
Auditing means recording and reviewing system activity so you can answer questions like:
Auditing does not prevent incidents by itself. Auditing helps you detect, investigate, and prove what happened. In regulated industries—banking, finance, healthcare—auditing is not optional. It is a core security requirement.
Now, zoom in on IBM i auditing. You use this on IBM i platforms to monitor system events specifically tailored to this robust OS. IBM i auditing logs actions that could impact security, performance, or data integrity. You capture details on user behaviors, object accesses, and system changes. Why bother? It helps you comply with standards like SOX, PCI DSS, or GDPR, and it uncovers vulnerabilities before they bite. IBM i makes this efficient with built-in tools, so you don’t need fancy add-ons right away—though we’ll touch on those later.
IBM i does this using:
All audit events go into journal receivers, which you can analyze later.
The key point:
👉 IBM i does not audit everything by default. You must plan and enable it.
IBM i security auditing takes things up a notch by focusing on threats and compliance. You enable it to track security-related events, such as profile changes, authority failures, or network intrusions. At its core, the system uses the Security Audit Journal (QAUDJRN) to store these logs. You control what gets audited through system values like QAUDCTL and QAUDLVL. This isn’t just logging for logging’s sake—you use it to detect anomalies, like a user trying to access restricted files. Set it up right, and you gain peace of mind knowing your system watches its own back.
IBM i security auditing focuses specifically on security-relevant actions, such as:
Security auditing helps you:
Nobody’s perfect, and IBM i auditing comes with pitfalls. You might overwhelm your system with too many logs, causing performance slowdowns—I’ve seen journals balloon and eat up disk space in my client’s environments. Or you forget to configure user-specific auditing, missing key activities from power users. Compliance gaps pop up if you don’t align with regulations, leading to failed audits. Virtualization changes can trigger IBM license audits if you don’t track them properly. Outdated OS versions expose vulnerabilities, and poor user profile management lets in risks like over-privileged accounts. To avoid these, start small: Audit only what matters, regularly purge old data, and use tools to automate checks. Trust me, fixing issues early saves you from bigger headaches.
Many IBM i systems technically have auditing enabled—but still fail audits.
Why?
You wouldn’t build a house without a blueprint, so don’t dive into auditing without a plan. First, gather your team—IT admins, compliance officers, and execs—to identify what you need.
Ask:
A solid plan ensures you audit effectively without bogging down your system.
In Part 2 of this topic, I will discuss,