Event generator sensors

Logs are the key and primary requirements for visualizing what's going on in your network and who's attacking. Every organization wants the logs coming from the all-critical resources of your network and business. As security administrator, you always want the logs from your firewall, IPS, and IDS. You will also want logs from your key servers sitting in DMZ, and of course you would also include Active Directory server and your key application, endpoint, and database servers. 

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.