Identify Suspicous Activity on your Edge Device

by [Published on 8 July 2013 / Last Updated on 25 July 2013]

Firewalls and gateways protect our networks at the edge, and one of their capabilities is logging activity so you can identify when something suspicious happens and take action if it turns out to be an attack.

Logs provide much useful information that can help you track down the source of suspcious activity (for example, numerous denied connections from a particular IP address). In this TechNet blog post, Yuri Diogenes explains how to use built in Windows tools such as the Event Log and Network Monitor to investigate suspicous activity on your edge device.

http://blogs.technet.com/b/yuridiogenes/archive/2011/06/02/identifying-suspicious-activity-on-your-edge-device-part-1.aspx

Add Review or Comment

Featured Links