Event Log Management Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
Information is power when it comes to guarding your IT system against cyber-attacks. Click on a link below to find out how event log management can help you to gather logs and analyse them for suspicious activity.
- Category: Event Log Management
Event Log, Audit Log and Syslog messages have always been a good source of troubleshooting and diagnostic information, but the need to back up audit trail files to a centralized log server is now a mandatory component of many governance standards.
- Category: Event Log Management
Whether you are working from a SANS 20 Security Best Practices approach or working with an auditor for SOX compliance or QSA for PCI compliance, you will be implementing a logging solution.
- Category: Event Log Management
If you're thinking "That's hardly breaking news?" I would tend to agree. However, it is still providing plenty of copy even though the PCI DSS was introduced seven long years ago. At the time it was 'mandatory' and 'urgent' but the problem now is that, so many firms have avoided or delayed measures that overcoming the apathy often associated with PCI compliance is getting more difficult.
- Category: Event Log Management
It is well known that Anti-Virus technology is fallible and will continue to be so by design. The landscape (Threatscape?) is always changing and AV systems will typically update their malware signature repositories at least once per day in an attempt to keep up with the new threats that have been isolated since the previous update.
- Disable Windows Services
- What are the recommended Audit Policy settings for Windows & Linux
- Server Hardening Policy - Examples and Tips
- Server Hardening Checklist - Which Configuration Hardening Checklist Will Make My Server Most Secure?
- Windows Server 2008 2008R2 Hardening Guide
- File Integrity Monitoring Software
- Linux Server Hardening
- The Windows Advanced Audit Policy Configuration
- The Top Ten of Audit and Event Log Monitoring
- Which File Integrity Monitoring Technology Is Best For FIM? File Integrity Monitoring FIM or SIEM FIM?