Log Files and Unnecessary Services and Accounts

When hardening a system, it is important to set up logging and to monitor the log files. It is also important to remove or disable unnecessary accounts and services. As you watch this video, note how security can be enhanced with log files, and take note of the system logs that should be reviewed. How should logs be formatted to make viewing of anomalous activity easy? When hardening individual systems, what should be disabled and what should be protected?

Source: PaceIT Online, https://www.youtube.com/watch?v=Q3_oWKFxagA
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Friday, November 20, 2020, 6:42 AM