Logging&monitoring: Difference between revisions
From ICO wiki
Jump to navigationJump to search
Line 20: | Line 20: | ||
'''Desktop machine''' | '''Desktop machine''' | ||
[[File:Screenshot from 2016-09-18 17-43-55.jpg|thumb| | [[File:Screenshot from 2016-09-18 17-43-55.jpg|thumb|right|Topology []]] | ||
Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100 | Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100 |
Revision as of 17:21, 18 September 2016
Author: Mohanad Aly
Group : Cyber Security Engineering (C21)
Page Created: 18 September 2016
Last modified:
Aim of this page
- logging and monitoring.
- The best solution for logging
- Threats.
- Securing during logging
Topology of the system
Desktop machine
Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100
Server machine ip address 192.168.56.200
- Can be connected over ssh with student@192.168.168.56.200
IDS ip address 192.168.56.201
Starting to update an upgrade for all machines
- First be super user
sudo -i
apt-get update
apt-get upgrade