1 Introduzione al Webinar Introduzione 2 Webinar replay Typical configuration mistakes that put your IBM i environment at high risk SecurityConfigMistakes Handouts