Tag: Audit policy
November 3, 2021 |
Server Hardening Policy: Examples and Tips
Various researches reveal that a staggering 80% of reported breaches involve exploiting vulnerabilities in the configurations of IT systems. To proactively block attacks and thereby prevent costly downtime and data breaches, experts recommend implementing a server hardening policy, which is a...
July 26, 2016 |
Top 4 Security Log Events to Audit
In this day and age, any organization with security on the forefront of their list of operational concerns needs to have an audit policy. Generally, this policy defines the types of log entries that will be monitored, the frequency with which those events will be monitored, and the action plan that...
January 15, 2016 |
How to Get User Logon Session Times from the Event Log
If you’re a knowledge worker, to be productive in a work environment, you’re probably going to need a user account. And you’re probably going to need to actually use this user account to login to your office and mobile devices. If you don’t, you’re probably not going to be working at that...
June 19, 2015 |
Configure Audit Policy and Security Using the Security Configuration Wizard
Windows Server security has improved markedly over the last decade, putting it up there with Unix-based operating systems, which traditionally are considered more secure than Windows. Much of this work is due to the infamous Vista reset, which saw Microsoft plough resources into Windows XP Service...