Configuring Raz-Lee ISecurity
To collect security and audit events, you must configure your Raz-Lee iSecurity installation to forward syslog events to JSA.
Syslog events that are forwarded by Raz-Lee iSecurity are automatically discovered by JSA by the IBM AS/400 iSeries DSM. In most cases, the log source is automatically created in JSA after a few events are detected. If the event rate is low, then you might be required to manually create a log source for Raz-Lee iSecurity in JSA.
Until the log source is automatically discovered and identified, the event type displays as Unknown on the Log Activity tab of JSA.