Protection against attacks is important, but attackers often use vulnerabilities and network tools to gather information about your network to plan an attack. While log information is valuable, you must balance the log information with the resources required to collect and store it. Depending on the detail in your logs, you may be able to determine the attackers location and identity. The packet archive and sniffer policy logs can reveal more details about the attack. How the attack unfolds may reveal weaknesses in your preparations. But monitoring allows you to review the progress of an attack, whether afterwards or while in progress. Monitoring, in the form of logging, alert email, and SNMP, does not directly protect your network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |