Conclusion

Structured, documented network knowledge is foundational to context-based security monitoring. By deploying tools for documenting and understanding your network environment, you can begin to prioritize security alerts based on how they affect your network. Chapter 4 will provide a third and final foundation, guiding you to select broad targets to prioritize your monitoring against.

Get Security Monitoring now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.