Get started Bring yourself up to speed with our introductory content.

Allow / not allow monitors

What's the difference between "Allowed to Use Monitors" and "Not Allowed to Use Monitors" in the server document?

These settings have a similar end result, but are two different ways of specifying who can use server monitors.

With the first parameter, you include a list of specific people who can use monitors. If you list no one, then no one can use them. (That is why the default setting is *.)

With the second parameter, you include a list of specific people who CANNOT use monitors.

So, if you have 500 people in your company, and only 2 of them are allowed to use monitors, list those 2 people in the "allow" field. If, on the other hand, you have 500 people and all but 2 of them are allowed to use monitors, list those 2 people in the "not allow" field.

This was last published in October 2001

Dig Deeper on Domino Resources - Part 2

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.




  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...


  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...