Legal Information
GOOD2USE Knowledge Network PC Firewaals Event Monitoring

Good Knowledge Is Good2Use

Event monitoring maintains a record of security-related events. Often, the record goes into a log file that is largely ignored unless or until someone takes the time to review it.

Reviewing a weekly event log does provide a security administrator with the advantage of hindsight, and allows them to consider past events in creating future policies. However, the weekly review may be the administrator's first indication of an attack or other serious event, and may come too late to allow a practical response.

Monitoring events in real time provides the advantage of being able to take immediate action, which can prevent possible damage and collect information about the attack that might not be available after the fact. Most modern firewalls and gateways offer some sort of real-time monitoring capability. Most of these work through "triggers," which launch a specific action in response to an event. Event monitoring provides you with both the means to detect intrusion, and the information you need afterwards.
Eight different types of events can be monitored:

When the firewall detects one of those events, it makes a response based on policy controls set by the administrator. Again, because some events may be unintentional, the administrator has the option of setting a threshold, which specifies an allowed amount of times for a given event over a given period of time. If that threshold is exceeded, a response is triggered. the firewall's event monitoring allows several different response types, including:

Search Knowledge Base Feedback
If you like our web site refer a friend.
Your friends name.
Your friends email address.
Your Name
Your Email Address


© Copyright 1998-1999 GOOD2USE