?
Solved

Need recommendations for a PKE Logging and Event program to monitor,  collect, store, and analyze data

Posted on 2014-10-24
1
Medium Priority
?
309 Views
Last Modified: 2014-10-27
PKE Logging and Event program to monitor,  collect, store, and analyze audit data and to retain system logs,  along with audit data, and IA events for those  devices. This needs to be done on Cisco Routers, Switches, ASA firewalls, Windows servers and preferably other types of servers like Unix and Linux.

I need some recommendations from the experts who have experience with programs like this?

Thank you,
0
Comment
Question by:dsterling
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 11

Accepted Solution

by:
Joseph O'Loughlin earned 2000 total points
ID: 40403108
Quite, those experts all work for security services.
Start with wireshark, to identify the packet types you are interested.
Set up a mirror port on a backbone switch.  Set up snort on an attached system with a large hard disk.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
A look at what happened in the Verizon cloud breach.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question