Solved

Top 10 Most Important Security Events to Monitor in Windows Event Log

Posted on 2008-10-28
8
2,955 Views
Last Modified: 2013-12-04
Top 10 Most Important Internet Security Events to Monitor in Windows Event Viewer
Also top events to monitor for Local GPO policies not being implemented-Looking for possible corrupt local security databases which indicate GPO are not being implemented.

Thank you,
John

0
Comment
Question by:jtsapos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
8 Comments
 
LVL 13

Expert Comment

by:Rowley
ID: 22831151
What if there are 600 events that are all equally important?
0
 

Author Comment

by:jtsapos
ID: 22833244
I'll take as many as you can give me. It would be greatly appreciated.
Also top events to monitor for Local GPO policies not being implemented-Looking for possible corrupt local security databases which indicate GPO are not being implemented.

0
 
LVL 13

Accepted Solution

by:
Rowley earned 250 total points
ID: 22839182
In my opinion this is a null question. The most important events in any logs are the ones that are meaningful to the administrator in the context of which they are being read. You could have a success logon event that pops up a thousand times a minute, or a single big red disk read error, a replication event, or a TCP stack warning, etc, etc.

You've also just responded with some specifics to monitor gpo events, ergo these events are important to you but may not be important to someone else. If you want to monitor events, and prioritise alerts for your environment, you could try something like http://www.gfi.com/eventsmanager/ .
0
 
LVL 62

Assisted Solution

by:gheist
gheist earned 250 total points
ID: 22929525
You should look other way around and silence out "normal" events.
e.g Audit Success i.e successful access/login denotes normal workings.
0
 
LVL 62

Expert Comment

by:gheist
ID: 23585671
Last two give insight into how to proceed B grade.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
CDC and AOG on MS SQL 2012 13 36
sftp vs SendThisFile 9 48
Blocking Websites with Security Groups in AWS 4 45
Web content filtering solution 6 22
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question