

IBM PowerSC Workshop
(AN80G)
Overview
This hands-on course is designed to provide students with a comprehensive understanding of IBM PowerSC, including its features, benefits, and how to install, configure, and manage it.
We will cover the four main pillars of PowerSC: Security, Compliance, threat protection, and Multifactor Authentication (MFA).
File Integrity Monitoring (FIM), allow listing, block listing, endpoint detection and response (EDR) and anti-malware capabilities will also be covered.
Audience
Enrollment in this course is not restricted. Typical students may include:
- Customers
- Technical IBM personnel
- Business partner technical personnel
- IT consultants and architects
Prerequisites
nullObjective
- Describe the key features and capabilities of PowerSC across AIX, IBM i, and Linux
- Perform the installation and initial configuration
- Summarize the purpose and usage of security compliance profiles
- Demonstrate how to manage and monitor endpoint security
- Configure system scans, reporting, and alerting mechanisms
- Explain the role and implementation of Multi-Factor Authentication (MFA)
- Implement anti-malware features and verify their effectiveness
- Configure allow lists using Trusted Execution and Fapolicyd for application security
- Analyze file integrity monitoring reports using Real-Time Compliance and auditd
Course Outline
- Unit 0: Course Introduction
- Unit 1: Introduction to IBM PowerSC on IBM Power (covering AIX, IBM i and Linux)
- Unit 2: Installation and Configuration of IBM PowerSC
- Unit 3: Security Compliance profiles
- Unit 4: Managing and Monitoring endpoint security
- Unit 5: Configuring system scans, reporting and alerting
- Unit 6: Introduction to MFA
- Unit 7: Anti-malware
- Unit 8: Allow List (Trusted Execution and Fapolicyd)
- Unit 9: File Integrity Monitoring (Real Time Compliance and auditd)
- Exercise 1. Accessing the lab environment
- Exercise 2. PowerSC Installation and Configuration
- Exercise 3. Working with Security Profiles
- Exercise 4. Creating Custom Profiles and Run Compliance Scans
- Exercise 5. Configuring MFA on AIX
- Exercise 6. Configuring Anti-malware
- Exercise 7. Allow List (Trusted Execution and fapolicyd)
Exercise 8. File Integrity Monitoring (Real Time Compliance and auditd)