Quantcast
Channel: THWACK: Message List
Viewing all articles
Browse latest Browse all 22513

Re: To Log Or Not To Log: That Is The Question

$
0
0

cahunt Agreed that the available information of majority malicious activities was IP address and time of activities. If on network of dynamic addressing, we need current or historic data from DHCP, DNS, ARP, MAC, etc to allocate the offending device. When we have an incident, we hope that we have all information available to us.


Viewing all articles
Browse latest Browse all 22513

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>