Conclusion

Deep, proactive security monitoring is overwhelming and unproductive if it isn’t targeted to specific systems. By selecting monitoring targets, you can narrow your focus to the most critical systems, making the most of your security monitoring equipment and staff. By spending the time to identify good monitoring targets, you will avoid wasting time on unproductive sources and, more importantly, improve your chances of finding the more serious security threats facing your enterprise. In the next chapter, we’ll select event feeds for monitoring these selected target systems.

Get Security Monitoring now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.