The most recent content from our members.
In the first blog of this series, What are Logs?, we learned what logs are and why they are useful to your organization. Now we are going to learn what happens when you have different types of log data and how your System Administrators don’t go crazy going through the thousands of logs that are produced. System…
Verifying Data Now that LEM is collecting your log data, use nDepth and LEM Reports to search, analyze, and report on that data. In most cases, use the nDepth Explorer in the LEM Console to search and analyze your dataa and use the stand-alone LEM Reports application to report on your data. Which Do I Pick? Use nDepth if…
Your Cisco devices don’t automatically log someone getting into your network and changing your Cisco router and switch configurations. But with a few simple commands, you can configure your Cisco routers and switches to monitor and log configuration changes when they occur. You can set this up on the routers and switches…
Take the survey here SolarWinds Security Survey Comments welcome here on the survey :
It looks like you're new here. Sign in or register to get started.