Inside and Outside Hack Attempts
Over the last several years I have conducted quite a few webinars with Randy F. Smith on a variety of topics that relate to Windows Audit Policies and Log Management. Two of these truly drive home the point about why you need to be looking at your logs (not just Windows but all sources; *NIX and Network Devices as well). The first of these was conducted on Jan 20, 2009 entitled “Anatomy of a Hack: Tracking an Intruder with Security Logs” and most recently on Feb 4, 2010 entitled “Insider Gone Bad: Tracking Their Steps and Building Your Case with the Security Log “.
No comments yet.
-
Archives
- February 2019 (1)
- October 2013 (1)
- August 2012 (1)
- December 2011 (1)
- May 2011 (1)
- July 2010 (1)
- March 2010 (1)
- February 2010 (1)
- December 2009 (1)
- November 2009 (1)
- October 2009 (1)
- September 2009 (1)
-
Categories
-
RSS
Entries RSS
Comments RSS
Leave a comment