Chapter 12. Solutions in this chapter:

  • Setting Logging Options
  • Setting Alerting Options
  • Generating End Point Security Reports
  • Keeping Tabs on Your Network
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In the previous chapter, I showed you how GFI EndPointSecurity is able to lock down end point devices on network workstations. However, network security is not a “set it and forget it” proposition. You need a way of verifying that the policies that you have put into place are working. It would also be nice to know when someone is trying to violate the policies that you have established. That's where this chapter comes into play. In this chapter, I will show you how to keep tabs on GFI EndPointSecurity.

Setting Logging ...

Get GFI Network Security and PCI Compliance Power Tools now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.