Will these security logs track failed logon attempts? From remote machines too? Will it track security events other than just logon/ logoff events? Can you use Event Viewer to view other logs? Why is there a log that tracks which Microsoft office programs you use and how long you use them? How could a top-notch hacker keep you from knowing which files were changed? Can you calculate a hash for a single file? From the hash could you tell what was changed in the file? Can you use the longest hash possible? How long is good enough?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here