Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > EventTracker > Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions
 

Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions

White Paper Published By: EventTracker
EventTracker
Published:  Nov 22, 2010
Type:  White Paper
Length:  4 pages

Monitoring the Windows Event Log is critical because the Operating System continuously monitors and logs critical security, system and application events in the Log. Monitoring the Windows Event Log alone, however, is simply not enough because many important conditions in Windows are not stored in the Event Log. The following are the ten most critical security conditions that are not monitored by the Windows Operating System or logged in the Event Log. These conditions are critical for any enterprise large or small.



Tags : 
windows, log management, siem, file changes, registry changes