13.07.2015 Views

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 15: Network/OS/Server AdministrationOperating System TasksNT has three event logs: System Security ApplicationThere may be indications of a developing problem. If the security audit parameters havebeen properly set, you could detect unauthorized attempts to access files.Configuring the security audit function is a tradeoff among the following:The need to log security events.System resources to track and maintain the log.The more detailed you make the log, the more the system performance will degrade.This degradation is due to the extra processing required to track and log the items.Effort required to audit the log (dependent on the size of the log).The following steps show you how to open the NT event logs.1. On the NT desktop, choose Start → Programs → Administrative Tools → Event Viewer.2. The following logs can be selectedunder Log:SystemSecurityApplication3. Look for unusual entries.2Monitor these entries regularly torecognize unfamiliar events suchas errors, failures, or securityrelatedentries. These events donot usually occur.System Adminstration Made Easy15–5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!