Security Auditing and Event Logs

  • Jonathan Hassell


You’ve come to the final chapter in this book, which is no small feat—congratulations! This part of the book focuses mainly on how you can discern if your hardening efforts, fine-tuned with what you’ve learned in the first nine chapters, were successful at thwarting attacks. Event logs and security auditing policies are an astute administrator’s best friend, but most IT personnel overlook logs, as if logs were there for no other purpose than to simply take up valuable hard disk space.


Audit Event Security Setting Retention Method Event Viewer Audit Failure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Apress 2004

Authors and Affiliations

  • Jonathan Hassell
    • 1
  1. 1.North Carolina State UniversityUSA

Personalised recommendations