Product Guide: Part 4 - Monitoring, Analyzing, and Fine-Tuning Your Protection Flashcards

1
Q

Why is it important to Monitor, Analyze, and Fine-Tune VSE

A

Improve both the performance and protection of your VSE-protected systems?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different activity logs that can be accessed on VSE managed systems?

A

AccessProtectionLog.txt - Displays Date, Time, Event, User, and name of file

BufferOverflowProtectionLog.txt - Displays Date, time, path to the mirror files, and any additional information

MirrorLog.txt - Date, Time, Path to the mirror files, and any additional informatin

OnAccessScanLog.txt - Date, time, detected, malware, what action was taken, and what was found

OnDemandScanLog.txt - Date, time scan occurred, any action performed, to what file, and what was found

UpdateLog.txt - Date, time update occurred, who initiated the update, and any information about the update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Importance of Analysis

A
  • Allows you to determine which kind of threats you are facing, from where, how often they are found, and which systems are being targeted
  • For example, if one system is being continuously attacked, maybe that system should be moved to a more secure part of your network, and have increased security enabled to protect it.
  • This analysis is also helpful when:
  • -Creating reports for IT and managers
  • -Capturing information used to create scripts and queries
  • -Monitoring network access time and VSE update network usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly