On Tue, Jan 27, 2009 at 9:13 AM, Mark Boersma <[email protected]> wrote: > The typical logging of which programs are run and what is used on a machine.
Don't forget that the Security audit log can be used to track process starts and exits. It's not a substitute for full scale "big brother" logging, but it's got its applications. It may be worthwhile enabling it on all workstations, just so you have some records available. In addition to "big brother", it can be useful for trouble-shooting, to correlate problems with activities. If you do enable it everywhere for this purpose, be sure to increase the security log max size, and set the rotation to overwrite as needed (rather than the default of only after seven days). -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
