Checking Your Servers Regularly

It is not enough to set up a security policy and expect it to be enforced. Why? For one reason your policy may have overlooked something or times may have changed. (They do, you know.) The best course of action to check for new security threats is to look for odd things in log files. This includes the Windows 2000 Event Viewer log files as well as any logging facilities provided by applications.

Windows Event Viewer and Application Log Files

Remember that the Event Viewer allows you to create filters and look for specific events. Saving these event log files to offline storage for later review is a good idea because many recent developments in computer hacking have involved more complicated programs. For example, ...

Get Microsoft® Windows® 2000 Security Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.