Following on from my previous blog on how to quickly perform a AIX security configuration audit, I thought I would take a look at how to remediate some of the security failures that the audit detected. The remediation will be done using the IBM Endpoint Manager Security Configuration Module. So if we use the same […]