All, Have you guys seen this doc called "Operational Security Current Practices" (see http://www.ietf.org/internet-drafts/draft-ietf-opsec-current-practices-02.txt)? It is supposed to give current ISP security practices and it has a neat section on logging (what to log, what to guard the logs from, etc). Specifically, see "2.7. Logging Considerations"... Best, -- Anton Chuvakin, Ph.D., GCIA, GCIH, GCFA http://www.chuvakin.org http://chuvakin.blogspot.com http://www.securitywarrior.com _______________________________________________ LogAnalysis mailing list LogAnalysis@private http://lists.shmoo.com/mailman/listinfo/loganalysis
This archive was generated by hypermail 2.1.3 : Thu Feb 23 2006 - 23:00:57 PST