Event log correlation and analysis
There are a different types of logs in a computer, for instance event logs and security logs. In order to see the event logs in Windows 10, search for ‘Event […]
There are a different types of logs in a computer, for instance event logs and security logs. In order to see the event logs in Windows 10, search for ‘Event […]
Listed are different logs system that can be used and analyze for different environment and applications: OS Logs • Windows – Event Logs • Linux – Syslog • Application Logs […]
NIDS is Network-based Intrusion Detection System, the tools here are used to detect if there are anomalies or suspicious behavior in our personal network. It sees traffic flow in the […]
Switchers map mac addresses of all devices in network which then maps to the switch port, locate the physical location of MACs .It also consists of ARP table (Address Resolution […]