(Check the software update status, check whether useless services are prohibited, check whether the restricted access of TCPWRAPPERS is configured, and recognize the security status of system log file permissions. This document includes the following attachments:
AIX host evaluation test form.doc
.....)