Solved

Event Log Monitoring / Port Monitoring Software?

Posted on 2007-11-17
1
331 Views
Last Modified: 2010-04-12
I am looking for useful Event Log Monitoring software, as well as any software tools to scan open ports on our web server running Microsoft Server 2003 R2 and SQL Standard 2005.  We want to monitor hack attempts as well as make the server as tight as possible.
0
Comment
Question by:cleversley
1 Comment
 
LVL 8

Accepted Solution

by:
deadite earned 500 total points
ID: 20354514
For scanners:
http://www.nessus.org/download/
http://insecure.org/nmap/

For Log Monitoring, I know GFI offers a solution:
http://www.gfi.com/lanselm/


If you want to monitor, check out some IDS software or hardware.  You can download snort for free:
http://www.snort.org/

Here's some best practice guides from MS:
http://technet2.microsoft.com/windowsserver/en/library/ace052a0-a713-423e-8e8c-4bf198f597b81033.mspx?mfr=true
http://www.microsoft.com/technet/security/prodtech/iis.mspx
http://technet.microsoft.com/en-us/sqlserver/bb331769.aspx

If you really want to go out, you can get a Cisco Engineer in to switch you all over to Cisco equipment.  They also offer an IDS, and they have a complete logging solution that will gather logs and notify any attacks on the network.  If you go that route, you're best off getting an engineer unless you really know your stuff.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now