You now have your systems reasonably secured, so it s time to relax, right? Wrong. You must be constantly vigilant in order to keep your systems in a secure state. If a system is in use, there is potential for weakness and vulnerability to be introduced into the configuration. Knowing when your machine is attacked or vulnerable is paramount to a good security posture . In this chapter, we will discuss some of the many self-monitoring tools you can use on your system to ensure that you keep a consistent and secure server. Here are the steps you need to take immediately to ensure your systems are properly monitored :
Install and run a host-based intrusion detection system
Install and run password auditing programs
Set up network monitoring