Jeff Christman is a veteran of more than 20 years in IT, specializing in network security, cloud administration and automation. He is currently a Cloud Systems Engineer for a large IT organization. Is ...
Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Ensuring that audit logs are enabled for Microsoft Office 365 can ...
This article is also available as a TechRepublic download. Most of the time, when a Windows related article talks about audit logs, those logs are security related. When it comes to the DHCP services ...
At the heart of most devices that provide protection for IT networks is an ability to log events and take actions based on those events. This application and system monitoring provides details both on ...