Monitoring and logging

As discussed in detail in the previous chapter, no security posture is complete without monitoring and logging. Without logging and monitoring, how would you know that your security holds? Keep in mind, though, that someone needs to be looking at these logs, alarms, and events for it to be effective. Refer to the previous chapter to see the various events that should be captured from your client computers.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.13.192