Optimizing Windows 10 logging to detect network security threats

被引:0
作者
Barath, Julius [1 ]
机构
[1] Armed Forces Acad Gen MR Stefanik, Dept Informat, Liptovsky Mikulas, Slovakia
来源
2017 COMMUNICATION AND INFORMATION TECHNOLOGIES (KIT) | 2017年
关键词
event logs; Microsoft windows; attack detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The collection and analysis of event logs allows detection and debugging of operating system and application configuration errors. An appropriate selection of event logs allows you to detect cyber-attacks and prevent potential damage. In the article, we focused on the selection and optimization of event logs for the Microsoft Windows operating system. We have experimentally verified the structure and amount of produced logs and we proposed their optimization.
引用
收藏
页码:10 / 12
页数:3
相关论文
共 7 条
  • [1] [Anonymous], 2017, ADV SEC AUD POL SETT
  • [2] [Anonymous], 2016, WINDOWS ITPRO DOCS W
  • [3] [Anonymous], 2006, SEC COMPL MAN
  • [4] [Anonymous], 2016, EV LOG EXPL
  • [5] [Anonymous], 2016, AUDIT POLICY RECOMME
  • [6] Costea A., 2016, CONFIGURE WINDOWS EV
  • [7] Lefferts R., 2017, INTRO WINDOWS DEFEND