Summary


Throughout this chapter, you learned of the many valuable roles that network file log analysis plays in a strong perimeter defense. By automating most of the log analysis and reviewing the reports generated by the automation, you can quickly gain insight into activity on your network and respond much more quickly to events that have just occurred or are in progress. Network log analysis can be of great assistance in such diverse areas as intrusion detection, incident handling, and problem troubleshooting. With an initial investment of time to familiarize yourself with typical log entries and to establish log analysis automation, you can make network log analysis an integral part of your perimeter defenses.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    Similar book on Amazon

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net