|
Post by account_disabled on Mar 4, 2024 7:32:02 GMT
When analyzing the infrastructure, we recommend following the following points : What do you want to watch and why? Look for answers to questions like: Where do we store the most sensitive data ? What type of security incident is most likely to threaten us? Which access points are the most vulnerable ? How would we like to respond to security incidents? Which performance issues will affect our customers . What equipment and systems you operate This USA Phone Number List step is an ideal opportunity to review the company's IT. List all the devices and systems relevant to the area you need to monitor. If you have assessed that it is most important for you to monitor events and activities at the network level , these may be, for example: network devices all switches, routers, firewalls, security technologies such as Radware, proxy servers); servers DNS, DHCP servers; Windows/Linux operating sytems. Apache, Nginx web servers; Tomcat, JBoss application servers); applications database systems – MariaDB, SQL Server; mail servers – Exchange, IMAP); authentication systems (eg Active Directory or LDAP servers); clients workstations – laptops and desktops; mobile devices – smartphones, tablets). The type of monitored logs and their retention period can be determined, for example, by legislative obligations or some of the ISO -type standards.
|
|