Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Event Log Monitoring / Port Monitoring Software?

Posted on 2007-11-17
1
334 Views
Last Modified: 2010-04-12
I am looking for useful Event Log Monitoring software, as well as any software tools to scan open ports on our web server running Microsoft Server 2003 R2 and SQL Standard 2005.  We want to monitor hack attempts as well as make the server as tight as possible.
0
Comment
Question by:cleversley
1 Comment
 
LVL 8

Accepted Solution

by:
deadite earned 500 total points
ID: 20354514
For scanners:
http://www.nessus.org/download/
http://insecure.org/nmap/

For Log Monitoring, I know GFI offers a solution:
http://www.gfi.com/lanselm/


If you want to monitor, check out some IDS software or hardware.  You can download snort for free:
http://www.snort.org/

Here's some best practice guides from MS:
http://technet2.microsoft.com/windowsserver/en/library/ace052a0-a713-423e-8e8c-4bf198f597b81033.mspx?mfr=true
http://www.microsoft.com/technet/security/prodtech/iis.mspx
http://technet.microsoft.com/en-us/sqlserver/bb331769.aspx

If you really want to go out, you can get a Cisco Engineer in to switch you all over to Cisco equipment.  They also offer an IDS, and they have a complete logging solution that will gather logs and notify any attacks on the network.  If you go that route, you're best off getting an engineer unless you really know your stuff.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question