August 2019
Intermediate to advanced
786 pages
20h 22m
English
The only way to identify potential security threats and security breaches in infrastructure is through continuous monitoring and auditing. When it comes to auditing, the Windows system itself provides advanced auditing capabilities to identify such security issues. However, by default, only certain types of actions are audited. These auditing settings are handled by Windows audit policies.
There are 10 categories of events we can audit in a Windows system: