Information Assurance Directorate: Spotting the Adversary with Windows Event Log Monitoring
Released: Jun 26, 2015
Publisher: CreateSpace Independent Publishing Platform
Format: Paperback, 54 pages
to view more data
Description:
It is increasingly difficult to detect malicious activity, which makes it extremely important to monitor and collect log data from as many useful sources as possible. This paper provides an introduction to collecting important Windows workstation event logs and storing them in a central location for easier searching and monitoring of network health. The focus of this guidance document is to assist United States Government and Department of Defense administrators in configuring central event log collection and recommend a basic set of events to collect on an enterprise network using Group Policy.
Low Price Summary
Top Bookstores
We're an Amazon Associate. We earn from qualifying purchases at Amazon and all stores listed here.
DISCLOSURE: We're an eBay Partner Network affiliate and we earn commissions from purchases you make on eBay via one of the links above.
DISCLOSURE: We're an eBay Partner Network affiliate and we earn commissions from purchases you make on eBay via one of the links above.
Want a Better Price Offer?
Set a price alert and get notified when the book starts selling at your price.
Want to Report a Pricing Issue?
Let us know about the pricing issue you've noticed so that we can fix it.