Network Monitoring and Defense
Introduction
Safeguard 13 - Network Monitoring and Defense
Procedures
13.1 - Centralize Security Event Alerting
This step is under construction.
13.2 - Deploy a Host-Based Intrusion Detection Solution
This step is under construction.
13.3 - Deploy a Network Intrusion Detection Solution
This step is under construction.
13.4 - Perform Traffic Filtering Between Network Segments
This step is under construction.
13.5 - Manage Access Control for Remote Assets
This step is under construction.
13.6 - Collect Network Traffic Flow Logs
This step is under construction.
Other
If you have questions that are not covered in these procedures, please contact the VT IT Security Office itso@vt.edu for a consultation.