Logwatch 3.3 3.3.5 3.3.6 Audit and Accountability csc6
This document from Ubuntu discusses Logwatch, a tool that will monitor your server's logs and email the administrator a digest on a daily basis.
This document from Ubuntu discusses Logwatch, a tool that will monitor your server's logs and email the administrator a digest on a daily basis.
This article discusses how User Activity Monitoring (UAM) can be used to thwart insider threats. The article discusses legal and ethical aspects of user activity monitoring and best practices.
The Dataverse auditing feature is designed to meet the external and internal auditing, compliance, security, and governance policies that are common to many enterprises. Dataverse auditing logs changes that are made to customer records in an environment with a Dataverse database. Dataverse auditing also logs user access through an app or through the SDK in an environment.
This article speaks to NIST's NTP servers that support authentication.
NIST resource that defines incident handling requirements from event to incident declaration.
This NIST Special Publication provides practical guidance on developing and maintaining effective log management practices.
This link from Norfolk State University serves as is an example of a log review, analysis, and reporting policy.
This cheat sheet covers all of the important aspects of logging such as what to include and how long to retain among others.
This blog discusses the biggest IT security threat facing companies today, their authorized users.
This policy from SANS helps identify requirements that must be met by a system to generate logs.