Chapter content7.1. Starting and stopping Airlock IAM (system service integration)7.2. Sandboxing with profiles7.3. Generating Airlock IAM log output7.4. Processing Airlock IAM log output7.5. Log message formats7.6. Monitoring/health checks7.7. Performance tuning and scaling best practices7.8. Data backup and restore7.9. Connection drop with slash and/or backslash in the username