-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Microsoft System Center 2012 R2 Compliance Management Cookbook
By :
To log all the required information and events in SCOM, we need to plan the compliance program. The planning includes identifying the data we need to audit and the events in Active Directory.
Before starting with detailed planning, you need to study the compliance regulatory documents (internal and external) to get the details of the information you need to log and audit.
In the recipes of this chapter, we will focus on the following two different scenarios:
You can find more details on brute-force attacks at http://en.wikipedia.org/wiki/Brute-force_attack.
The following sections will show you how to plan the needed details.
The planning details to fulfill the requirements of this...
Change the font size
Change margin width
Change background colour