Audit logs
Audit logs store data of user 1,2 and 3 with their IP addresses as well as transaction data such as time and date. Audit logs have exciting features as they can note the current system user, and how long ago they logged in, network users are also not left out with their IP address together with the kind of data they accessed.they are like cameras after a robbery, they should be configured appropriately, and records swell stored. It admins use them in tracking potential patching breaches and preventing as well as helping resolve during such an event.
As the proper learned configuration is a must-do or has in network security and access control while we monitor and determining levels of access through the network. During training, I got to understand some of the possible issues associated with ensuring Active Directory audit policies on point. These policies are prone to attack as they hold cyber directory services. However, it isn’t found on Dimitralised Zone due to its internet connection.
Auditing, as well as recording, are most critical to Active Directory objects, and they do affect security as well as lowering network performance. These are huge errors since poor care on this part gives way to a cybersecurity breach. System admins also ensure unnecessary datum is not stored and they don’t log in to too many events as it may create huge unnecessary traffic while also lowering security and leaving the system at risk of loss of private data.
Practice labs do not depict the full scale of an entire network hosting hundreds to thousands of systems.this would also make logging and auditing the more complex. Individual system terminal logs allow the system admin capacity in tracking, auditing and monitoring system checkups. Vast numbers of client computers slow and put systems are susceptible to cyber risks.
Notwithstanding infrastructure as a service may be complicated in terms of control access, application and administration. Practical lab tests indicate that network admins can maintain and record network activity and utilization, audit logs monitor and coordinate performance.
Moreover, we have learnt through practical laboratory activities on how to recognize core components of Audit logs and to coordinate a number of domain controls. Furthermore, we can now create several user accounts and groups. We can also create new policies, performing group policies updates and its importance in saving changes. Moreover, I know default configuration in accordance with audit account login and lockout. The proper configuration makes it easier for infrastructure in controlling and in the monitoring of user access.
Reference:
- The Benefits and Risks of Cloud Computing. (n.d.). Retrieved from https://www.claconnect.com/resources/articles/the-benefits-and-risks-of-cloud-computing.