You’ve come to the final chapter in this book, which is no small feat—congratulations! This part of the book focuses mainly on how you can discern if your hardening efforts, fine-tuned with what you’ve learned in the first nine chapters, were successful at thwarting attacks. Event logs and security auditing policies are an astute administrator’s best friend, but most IT personnel overlook logs, as if logs were there for no other purpose than to simply take up valuable hard disk space.
KeywordsAudit Event Security Setting Retention Method Event Viewer Audit Failure
Unable to display preview. Download preview PDF.