AN80G: IBM PowerSC Workshop

IBM Systems Training

on March 14, 2026

      

3 min read

––– views


Table of Contents

  1. Short Summary
  2. Duration
  3. Content Description
  4. Objectives
  5. Agenda
  6. Audience
  7. Skill Level
  8. Labs?
  9. Keywords
  10. Prerequisites
  11. Enrollment
  12. Errata
  13. Follow-on Courses

Short Summary

This course is designed to provide students with a comprehensive understanding of IBM PowerSC, including its features, benefits, and how to install, configure, and manage it.

Duration in Hours ⌚

24.0

Content Description

This hands-on course is designed to provide students with a comprehensive understanding of IBM PowerSC, including its features, benefits, and how to install, configure, and manage it.

We will cover the four main pillars of PowerSC: Security, Compliance, threat protection, and Multifactor Authentication (MFA).

File Integrity Monitoring (FIM), allow listing, block listing, endpoint detection and response (EDR) and anti-malware capabilities will also be covered.

Objectives

  • Describe the key features and capabilities of PowerSC across AIX, IBM i, and Linux
  • Perform the installation and initial configuration
  • Summarize the purpose and usage of security compliance profiles
  • Demonstrate how to manage and monitor endpoint security
  • Configure system scans, reporting, and alerting mechanisms
  • Explain the role and implementation of Multi-Factor Authentication (MFA)
  • Implement anti-malware features and verify their effectiveness
  • Configure allow lists using Trusted Execution and Fapolicyd for application security
  • Analyze file integrity monitoring reports using Real-Time Compliance and auditd

Agenda

  • Unit 0: Course Introduction
  • Unit 1: Introduction to IBM PowerSC on IBM Power (covering AIX, IBM i and Linux)
  • Unit 2: Installation and Configuration of IBM PowerSC
  • Unit 3: Security Compliance profiles
  • Unit 4: Managing and Monitoring endpoint security
  • Unit 5: Configuring system scans, reporting and alerting
  • Unit 6: Introduction to MFA
  • Unit 7: Anti-malware
  • Unit 8: Allow List (Trusted Execution and Fapolicyd)
  • Unit 9: File Integrity Monitoring (Real Time Compliance and auditd)
  • Exercise 1. Accessing the lab environment
  • Exercise 2. PowerSC Installation and Configuration
  • Exercise 3. Working with Security Profiles
  • Exercise 4. Creating Custom Profiles and Run Compliance Scans
  • Exercise 5. Configuring MFA on AIX
  • Exercise 6. Configuring Anti-malware
  • Exercise 7. Allow List (Trusted Execution and fapolicyd)
  • Exercise 8. File Integrity Monitoring (Real Time Compliance and auditd)

Audience

Enrollment in this course is not restricted. Typical students may include:

  • Customers
  • Technical IBM personnel
  • Business partner technical personnel
  • IT consultants and architects

Skill Level

Basic

Labs? 💻

Yes

Keywords

AN80G; PowerSC; AIX; Linux; IBM i

Prerequisites

None

Enrollment

https://www.ibm.com/training/course/AN80G

Errata

None specified.

Follow-on Courses

AN12G,QZD32DG,QZC30G


View on GitHubView on IBM website

Designed and developed by Upendra Rajan