Configuration Audits

In this chapter, we will cover the following:

  • Introducing compliance scans
  • Selecting a compliance scan policy
  • Introducing configuration audits
  • Performing an operating system audit
  • Performing a database audit
  • Performing a web application scan
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.0.157