O'Reilly logo

Upgrading and Repairing Networks, Fifth Edition by Mark Edward Soper, Terry W Ogletree

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 43. Auditing and Other Monitoring Measures

SOME OF THE MAIN TOPICS IN THIS CHAPTER ARE

Unix and Linux Systems 829

Configuring Windows NT 4.0 Auditing Policies 832

Configuring Windows 2000 and Windows Server 2003 Auditing Policies 836

Auditing Windows XP Professional Computers 845

Novell Security 846

NetWare Auditing Solutions 848

Security for an individual computer system or for the network as a whole requires a two-pronged approach. First you must try to ensure that all applications and data are secured against unauthorized usage. This can mean anything from setting up and enforcing a good password policy to using the access mechanisms (such as resource permissions) provided by the operating system or network software to secure resources ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required