Logging&monitoring: Difference between revisions

From ICO wiki
Jump to navigationJump to search
Line 19: Line 19:
<span style="color:#20B336">
<span style="color:#20B336">
'''Desktop machine'''
'''Desktop machine'''
[[File:|thumb|center|Topology []]]
 
[[File:Screenshot from 2016-09-18 17-43-55.jpg|thumb|center|Topology []]]
 
Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100
Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100


Line 27: Line 29:
<span style="color:#FF0000">
<span style="color:#FF0000">
'''IDS ip address 192.168.56.201'''
'''IDS ip address 192.168.56.201'''


=Starting to update an upgrade for all machines=
=Starting to update an upgrade for all machines=

Revision as of 18:19, 18 September 2016

Author: Mohanad Aly

Group : Cyber Security Engineering (C21)

Page Created: 18 September 2016

‎Last modified: ‎

Aim of this page

  • logging and monitoring.
  • The best solution for logging
  • Threats.
  • Securing during logging


Topology of the system

Desktop machine

Topology []

Begin with the basic setup, network configuration and make the machine has internet access which the ip address of the machine is 192.168.56.100

Server machine ip address 192.168.56.200

  • Can be connected over ssh with student@192.168.168.56.200

IDS ip address 192.168.56.201

Starting to update an upgrade for all machines

  • First be super user sudo -i

apt-get update

apt-get upgrade

Initial Setup

Summary

See also

References