second try
________________________________
From: Rivera, Angel L.
Sent: Monday, May 01, 2006 7:20 AM
To: [EMAIL PROTECTED]
Subject: FW: NIST releases DRAFT Guide to Computer Security Log
Management
worth taking a look at
http://www.fcw.com/article94229-04-28-06-Web
http://csrc.nist.gov/publications/drafts/DRAFT-SP800-92.pdf
This document provides detailed information on
developing, implementing, and maintaining effective log management
practices throughout an enterprise. It includes guidance on
establishing a centralized log management infrastructure, which
includes hardware, software, networks, and media. It also discusses the
log management processes that should be put in place at an
organization-wide level, including the definition of roles and
responsibilities, the creation of feasible logging policies, and the
division of responsibilities between system-level and
organization-level administrators. Guidance is also provided on log
management at the individual system level, such as configuring log
generating sources, supporting logging operations, performing log data
analysis, and managing long-term data storage.
------------------------------------------------------------------------
Test Your IDS
Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708
to learn more.
------------------------------------------------------------------------