February 2009
Intermediate to advanced
256 pages
7h 43m
English
The heart of security monitoring—configuring systems to record, forward, and collect security events—culminates the preparation of all the previous chapters. This chapter provided guidance on how you can carefully configure systems that fit your infrastructure, and then tune them so you can detect the real security events. In the next chapter, we’ll explain how to keep things humming. Once you’ve gone to all this trouble to configure your events, you don’t want them to go missing, now do you?