Chapter 23. Monitoring Security Events
Viewing the Log of Security Events 781
Viewing Other Security-Related Logs 788
You can't keep an eye on your computer—let alone all the other computers on your network—all the time. Although you might have put in place all the proper safeguards to protect your data from unauthorized access (such as strong passwords, appropriate permissions, and a firewall), you can't be sure that those safeguards are always working properly. By taking advantage of improper settings inadvertently made by a user, or simply by making a determined effort, an attacker might still gain access to resources that should be off limits.
Fortunately, Microsoft Windows XP Professional and Windows 2000 provide ...
Get Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.