Network Monitoring and Defense

Introduction

Safeguard 13 - Network Monitoring and Defense

Procedures

13.1 - Centralize Security Event Alerting

This step is under construction.

13.2 - Deploy a Host-Based Intrusion Detection Solution

This step is under construction.

13.3 - Deploy a Network Intrusion Detection Solution

This step is under construction.

13.4 - Perform Traffic Filtering Between Network Segments

This step is under construction.

13.5 - Manage Access Control for Remote Assets

This step is under construction.

13.6 - Collect Network Traffic Flow Logs

This step is under construction.

Other

If you have questions that are not covered in these procedures, please contact the VT IT Security Office itso@vt.edu for a consultation.