Environment Monitoring Retention and Data Logging
Logging is used to record events that occur within an organizations systems and networks. Oftentimes logging information can help with the identification and isolation of any intruder or malware. In this course explore acceptable use policies (AUP) and how they apply to employee monitoring. Discover how monitoring as a service can benefit an organization and explore devices that can be monitored on a network including routers switches laptops and wireless access points. Explore how retention policies can identify how long different types of data are maintained and discover when to implement a centralized enterprise logging service. Lastly explore how keystroke loggers can capture and track what is typed on a keyboard and learn the importance of protecting log information. This course was originally created by Global Knowledge (GK).