Chapter 8 Security Auditing
Scripts and Samples in this Chapter
In This Toolbox
In Chapter 2, we covered analyzing different log files to obtain information about a server’s performance, usage, security, and health status. However, it is important to note that this information is derived from captured log files; in other words – its history, as it represents the requests or server actions that have already occurred.
Security auditing, on the other hand, checks and scans through related settings ...
Get Microsoft Log Parser Toolkit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.