Chapter 19. Logs and User Activity Accounting


Chapter 19. Logs and User Activity Accounting


  • The Role of Logs

  • User Logins and Accounting

  • Automated Log Monitoring: LogSentry

  • Common System Log Changes

Chapter 18, "Alarm Systems: Intrusion Detection," gave you the tools to monitor the health of your network and identify potential attacks. But no amount of packet analysis can tell you what is actually taking place on your computer. The key to monitoring your computer's health is managing and interpreting the logfiles that are generated. Logs are Mac OS X's means of providing feedback to you, the user. Logs are also the first target of any attacker attempting to gain access to your machine. Without logs, you may never even realize your computer has been compromised.


Mac OS X Maximum Security
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158 © 2008-2017.
If you may any questions please contact us: