Identify Suspicous Activity on your Edge Device

by [Published on 8 July 2013 / Last Updated on 25 July 2013]

Firewalls and gateways protect our networks at the edge, and one of their capabilities is logging activity so you can identify when something suspicious happens and take action if it turns out to be an attack.

Logs provide much useful information that can help you track down the source of suspcious activity (for example, numerous denied connections from a particular IP address). In this TechNet blog post, Yuri Diogenes explains how to use built in Windows tools such as the Event Log and Network Monitor to investigate suspicous activity on your edge device.

See Also

Review and Comments

* Required field

The Author — Debra Shinder

Debra Shinder avatar

DEBRA LITTLEJOHN SHINDER, MCSE, MVP (Security) is a technology consultant, trainer and writer who has authored a number of books on computer operating systems, networking, and security.

Featured Links