Privileged Access Management
Privileged Access Management (PAM) solutions protect and track the use of sensitive or critical capabilities such as administrative or service accounts. PAM solutions provide a centralized management interface for authentication and access control throughout the network. This unification provides simplified...
25 April 2017 2 page(s) pdf
Bro NSM Hunting Tips
The Bro Network Security Monitor (NSM) is used on networks worldwide for in-depth network monitoring and hunting for potential malicious activities. This document provides tips for analysts on how to raise a notice when irregular activity is observed on a...
12 December 2017 25 page(s) pdf
Spotting the Adversary with Windows Event Log Monitoring (version 2)
This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event...
07 August 2015 54 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-5 of 5 results returned for: "keywords:"Event Logging""