Monitoring Security

We recommend a two-pronged strategy for the monitoring necessary to keep apprised of the quality of security on your network and IMAP server. First, run a variety of tools that let you observe, at a low level, the character of the traffic on your network. Second, never be in doubt about the status of your services. Know beyond any doubt if every server of yours is up or down and, by extension, if every service is up or down. Hopefully, you have the resources to engineer your Internet services so that the failure of one or two servers doesn’t negatively impact the status of the service they provide.

IP Watcher

http://www.engarde.com/software/ipwatcher/

IP Watcher is a slick application that displays, in either an X or a Curses application, a list of all the current TCP-based sessions in progress and permits you to observe or disconnect them. IP Watcher is a tool you may never need. If, however, you have an incursion on your network and the hacker’s already on the premises, there’s a chance you might be able to gather more evidence if you have IP Watcher handy.

NetLog

http://www.net.tamu.edu/ftp/security/TAMU/netlog.README

NetLog is at the other end of the spectrum from IP Watcher. While IP Watcher excels at watching what a single person is doing on the network, right down to duplicating the contents of her Telnet session screen, NetLog lets you characterize the usage of your network over time. Think of IP Watcher as a single phone tap and NetLog as ...

Get Managing IMAP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.