Solved

Event Log Monitoring / Port Monitoring Software?

Posted on 2007-11-17
1
337 Views
Last Modified: 2010-04-12
I am looking for useful Event Log Monitoring software, as well as any software tools to scan open ports on our web server running Microsoft Server 2003 R2 and SQL Standard 2005.  We want to monitor hack attempts as well as make the server as tight as possible.
0
Comment
Question by:cleversley
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 8

Accepted Solution

by:
deadite earned 500 total points
ID: 20354514
For scanners:
http://www.nessus.org/download/
http://insecure.org/nmap/

For Log Monitoring, I know GFI offers a solution:
http://www.gfi.com/lanselm/


If you want to monitor, check out some IDS software or hardware.  You can download snort for free:
http://www.snort.org/

Here's some best practice guides from MS:
http://technet2.microsoft.com/windowsserver/en/library/ace052a0-a713-423e-8e8c-4bf198f597b81033.mspx?mfr=true
http://www.microsoft.com/technet/security/prodtech/iis.mspx
http://technet.microsoft.com/en-us/sqlserver/bb331769.aspx

If you really want to go out, you can get a Cisco Engineer in to switch you all over to Cisco equipment.  They also offer an IDS, and they have a complete logging solution that will gather logs and notify any attacks on the network.  If you go that route, you're best off getting an engineer unless you really know your stuff.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question