Logging&monitoring: Difference between revisions

From ICO wiki
Jump to navigationJump to search
Malyhass (talk | contribs)
Malyhass (talk | contribs)
Line 20: Line 20:
'''Desktop machine'''
'''Desktop machine'''


[[File:Screenshot from 2016-09-18 17-43-55.jpg|thumb|center|Topology []]]
[[File:Screenshot from 2016-09-18 17-43-55.jpg|thumb|right|Topology []]]


Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100
Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100

Revision as of 17:21, 18 September 2016

Author: Mohanad Aly

Group : Cyber Security Engineering (C21)

Page Created: 18 September 2016

‎Last modified: ‎

Aim of this page

  • logging and monitoring.
  • The best solution for logging
  • Threats.
  • Securing during logging


Topology of the system

Desktop machine

Topology []

Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100

Server machine ip address 192.168.56.200

  • Can be connected over ssh with student@192.168.168.56.200

IDS ip address 192.168.56.201

Starting to update an upgrade for all machines

  • First be super user sudo -i

apt-get update

apt-get upgrade

Initial Setup

Summary

See also

References