Log management and intelligence

Results: 20



#Item
11Information technology management / Information security / Security log / Login / Log management and intelligence / Windows Security Log / Computer security / Security / Computing

Microsoft Word - Enterprise_Security_Logging_Standard_v1.0.docx

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
12Information technology management / Information security / Security log / Windows Security Log / Log management and intelligence / Computer security / Security / Computing

[removed]New York State Information Technology Standard No: NYS-S14-005 IT Standard:

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
13Information security / Event Viewer / Access control / Log management and intelligence / Log analysis / Computer security / Security / Public safety

Level 3 – Public Use Page 1 of 5 Information Technology Log/Event Management Guidelines

Add to Reading List

Source URL: www.csun.edu

Language: English - Date: 2012-10-11 13:30:51
14Business / Information technology management / Dashboard / Computing / Business intelligence

Create Account & Log in here Page |1 https://apps.tn.gov/ustop/ You create your own password and user ID (remember your user ID must not have any spaces)

Add to Reading List

Source URL: www.tn.gov

Language: English - Date: 2013-05-17 11:51:58
15Information technology management / Information security / Security log / Windows Security Log / Log management and intelligence / Computer security / Security / Computing

[removed]New York State Information Technology Standard No: NYS-S14-005 IT Standard:

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
16Information technology management / Information security / Security log / Login / Log management and intelligence / Windows Security Log / Computer security / Security / Computing

Microsoft Word - Enterprise_Security_Logging_Standard_v1.0.docx

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
17Host Based Security System / United States Department of Defense / Log analysis / Windows Server / Log management and intelligence / Computing / Computer security / Computer networking

Understand Data Required for Analysis/Detection

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:48
18Event data / Computing / Audit trail / System administration / Log management and intelligence / Electronics / Log analysis / Computer security / Auditing / Network management

Understand Data Required for Analysis/Detection

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:48
19Security / Log analysis / Server log / Security information and event management / Information security / Network security / Log / Proxy server / Log management and intelligence / Computer security / Computing / Data security

Centre for the Protection of National Infrastructure Effective Log Management Author: Tom Goldsmith Context Ref: [removed]CPNI-CTX - Effective Log Management

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-05-16 06:14:27
20Computer data logging / Log analysis / Data / Audit trail / Database / Email / Transaction log / Log management and intelligence / Database management systems / Computing / Data management

Aardvark Secure Solution Brief

Add to Reading List

Source URL: www.d2k.com

Language: English - Date: 2005-10-07 07:43:16
UPDATE