Conclusion

The heart of security monitoring—configuring systems to record, forward, and collect security events—culminates the preparation of all the previous chapters. This chapter provided guidance on how you can carefully configure systems that fit your infrastructure, and then tune them so you can detect the real security events. In the next chapter, we’ll explain how to keep things humming. Once you’ve gone to all this trouble to configure your events, you don’t want them to go missing, now do you?

Get Security Monitoring now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.