When you start a Linux desktop, hundreds of log entries are stored on the computer. In this video, you’ll learn how to search through the kernel ring buffer and identify the areas of the operating system that store application and boot log files.
The information traversing the network can be a valuable source of forensic data. In this video, you’ll learn about some common data gathering techniques for network traffic data.
One of the more challenging aspects of network security is keeping your data and users safe when they are outside of the building. In this video, you’ll learn about remote access requirements and how to use enhanced features to keep your remove access secure.
Every network and security device creates logs, and analyzing the log can often provide important security information. In this video, you’ll learn about the log creation process and the tools you can use to analyze security logs.
Your logs contain valuable information, if you know where to look. In this video, you’ll learn about log monitoring, the use of security baselines and thresholds, and the importance of securing your log information.
It’s easy to monitor the performance of your Windows 7 desktop, but what options are available to constantly monitor the performance of every desktop in your enterprise? In this video, you’ll learn about event log configurations and filters, event subscriptions, data collector sets, and creating a system diagnostics report.
Now that your remote VPN connection is running, you can take advantage of some Windows 7 technologies to make the most of your limited bandwidth. In this video, you’ll learn about Windows’ NAP technology, the process for auditing your remote connections, and how to publish individual applications using Remote Desktop’s RemoteApp feature.