04-11-2011 03:26 PM - edited 03-04-2019 12:02 PM
Just to clarify I know where to pull the logs.. It is the filtering that i am not sure of
Message was edited by: Beachbum123
04-11-2011 03:28 PM
Just to clarify I know where to pull the logs.. It is the filtering that i am not sure of
04-11-2011 11:03 PM
Hi
Well since you do research on this you most likely already know this, but if you are a target you ship all the logs to a syslog server and secure that and you log everything you can since you have no idea what they will be doing next and logging it and not needing it beats not having it and needing it.
Good luck !
HTH
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide