home.aspx

 
.

WILL THAT BE ONE LOG OR TWO? LOGGING BEFORE, DURING, AND AFTER AN ATTACK

February 19, 2020 | (3:30 PM)
USA (United States of America)
SHARESHARESHARE
In this webcast Craig will present pros and cons of each option and discuss some of the current standards for configuring logging on workstations, explain what types of attacks leave no, or minimal traces with regards to those configurations, and suggest additional logs to enable or collect when a host is suspected of being compromised