A key part of any cybersecurity plan is “continuous monitoring”, or enabling auditing and monitoring throughout a network environment and configuring automated analysis of the resulting logs to identify anomalous behaviors that merit investigation. This...(read more)
via Mark's Blog http://blogs.technet.com/b/markrussinovich/archive/2012/10/30/3529266.aspx
via Mark's Blog http://blogs.technet.com/b/markrussinovich/archive/2012/10/30/3529266.aspx
Ingen kommentarer:
Legg inn en kommentar