Inside This Book: Presenting the Business Case for Free Solutions, Protecting Your Perimeter, Protecting Network Resources, Configuring an Intrusion Detection System, Managing Event Logs, Testing and Auditing Your Systems, Network Reporting and Troubleshooting, Security as an Ongoing Process. Learn the methods for maintenance, including patching software, upgrading hardware, and keeping IDS and antivirus signatures up to date. 8 Keep Your Network Secure with Proper Maintenance. Understand sniffing and related tools like NetFlow. Find complete coverage of Nessus, one of the best of class free vulnerability scanners. 6 Determine the Security Status of Your Systems. Find out about the tools available for log file collection, generation, import, export, and analysis. Learn how to install and configure Snort on both a Windows and a Linux operating system. 4 Configure an Intrusion Detection System. Snort can be intensive on your firewall if it is low powered. If suspicious traffic is detected based on these rules, an alert is raised. Snort works by downloading definitions that it uses to inspect traffic as it passes through the firewall. Using GPOs is a means to provide centrally managed security configurations to all of your protected hosts. This guide will show you how to setup Snort on pfSense to add IDS/IPS functionality to your firewall. Learn about products such as SmoothWall, which turns a PC into a dedicated firewall appliance that is completely configurable without ever logging into the underlying Linux operating system. If you want to stay on the cutting edge, free open source software might be a better path than commercial solutions. It will explain security principles and then demonstrate how to achieve them using only freely available software.1 Compare Free Solutions with Commercial Solutions. The examples and information will be of immense value to every small business. With this book as a guide, everyone can get what they want. Upper management wants thing to be secure but doesn't want to pay for it. Summary: Network security is in a constant struggle for budget to get things done. Wireshark (formerly Ethereal), The most powerful network sniffer & protocol.
0 Comments
Leave a Reply. |