O'Reilly logo

GFI Network Security and PCI Compliance Power Tools by Brien Posey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Solutions in this chapter:

  • Setting Logging Options
  • Setting Alerting Options
  • Generating End Point Security Reports
  • Keeping Tabs on Your Network
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In the previous chapter, I showed you how GFI EndPointSecurity is able to lock down end point devices on network workstations. However, network security is not a “set it and forget it” proposition. You need a way of verifying that the policies that you have put into place are working. It would also be nice to know when someone is trying to violate the policies that you have established. That's where this chapter comes into play. In this chapter, I will show you how to keep tabs on GFI EndPointSecurity.

Setting Logging ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required