Great Circle Associates Firewalls
(December 1997)
 

Indexed By Date: [Previous] [Next] Indexed By Thread: [Previous] [Next]

Subject: Re: [NTSEC] System Auditing ...
From: Jeff Barber <jeffb @ issl . atl . hp . com>
Date: Mon, 22 Dec 1997 15:09:22 -0500 (EST)
To: sundaram @ austin . asc . slb . com
Cc: firewalls @ greatcircle . com, ntsecurity @ iss . net
In-reply-to: <C2F7396663FCD0119B3E00A02451887D6B05E6 @ trader-apc . austin . asc . slb . com> from "sundaram @ austin . asc . slb . com" at Dec 22, 97 09:29:29 am

sundaram @
 austin .
 asc .
 slb .
 com writes:

> 	I've been looking fruitlessly on the net for system auditing
> documents -- not necessarily a checklist, but how an audit of a network
> / system would be performed. This would include, for example, physical
> security, OS security, personnel security, social engineering and more.
> Would anyone know where to find any information on auditing ?

Not on the net.  But Microsoft Press has a book entitled "Microsoft 
Windows NT 3.5 Guidelines for Security, Audit and Control", ISBN
1-55615-814-9.


References:
Indexed By Date Previous: Re: Firewall for ISP
From: Phil Burton <Phil . Burton @ Eng . Sun . COM>
Next: Re: FireWall for Dial-In Users
From: Steve Kruse <jsk347 @ sprynet . com>
Indexed By Thread Previous: Re: System Auditing ...
From: Hal Miller <hal @ tera . tera . com>
Next: Check Point vs. Gauntlet
From: "Takacs Istvan" <anonymus @ mail . matav . hu>

Google
 
Search Internet Search www.greatcircle.com