I dont think that "network logging" has a specific meaning ! What I suspect they are getting at is audit trails of network activity - which can mean many things - for example from the "topical" list -
Legitimate activity on an internal network - when they log in, what transactions they do, when they log out Intrusion attempts - failed password attempts, attacks on specific ports etc. Employee internet usage The question "is our network loggin" adequate, is impossible to answer because at the end of the day, network logging is just another detect control - and needs to be looked at in the context of every other control on your business systems. After all, knowing that somebody has hacked into your network is pretty important, but not as important as stopping them in the first place, and the log is pretty useless if to find the hack, you have to sift through 2 million legitimate accesses a day to find them ! Nick Avery Head of Internal Audit The Tote --------------------------------------------------------- This e-mail and its contents are confidential. If you have received this e-mail in error, please notify us and delete it from your computer. You should not copy or use it for any purpose or disclose its contents to any other person. Whilst we believe this e-mail and its attachments are free from any virus or other defect which might affect any computer or IT system where it is opened, we will not be held responsible for any loss or damage arising from it.
