Identifying Security Risks

A network’s security is only as good as the security mechanisms put into place and the review and identification process. Strong security entails employing Windows Server 2012 security measures, such as authentication, auditing, and authorization controls, but it also means that security information is properly and promptly reviewed. Information that can be reviewed includes Event Viewer logs, service-specific logs, application logs, and performance data.

All the security information for Windows Server 2012 can be logged, but without a formal review and identification process the information is useless. Also, security-related information can be complex and unwieldy depending on what information is being recorded. For ...

Get Windows Server® 2012 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.