LogAnalysis Mode:
(Page 6 of 91)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
[logs] Research communities in Log Analysis 2008-03-02
Suman Kumar (sumankumar4 gmail com)
Hi all,

I am an Information Retrieval(IR) researcher, looking to apply IR
techniques in Log Analysis problems. Can you direct me to some of the good
Log Analysis research communities. It is great if you can point me some
good(or baseline) research papers in this area.

Awaiting your reply,
Cha

[ more ]  [ reply ]
[logs] Re: Eventlog to syslog 2008-03-01
Dean Frye (dfrye evercom net au)


>If we *really* want to get MS' attention on this issue, we need to find
>some large Microsoft customers who are willing to apply pressure to
>their account managers about syslog support.

Most large organizations are going to have Microsoft Operations Manager
which gives you the ACS service. I

[ more ]  [ reply ]
Re: [logs] Eventlog to syslog 2008-03-01
tbird precision-guesswork com
Quoting David Corlette <DCorlette (at) novell (dot) com [email concealed]>:

> Why not have them implement a modern, secure auditing standard? The
> CEE and XDAS work is promising, and is getting analysts attention
> (Burton, for one). They aren't complete yet, but if you look at
> the requirements they embody you

[ more ]  [ reply ]
Re: [logs] Eventlog to syslog 2008-02-29
Marcus J. Ranum (mjr ranum com)
tbird (at) precision-guesswork (dot) com [email concealed] wrote:
>If we *really* want to get MS' attention on this issue, we need to
>find some large Microsoft customers who are willing to apply pressure
>to their account managers about syslog support.

Require it for PCI compliance or for one of the DOD standards,
with no

[ more ]  [ reply ]
[logs] Eventlog to syslog 2008-02-29
Marcelo de Souza (marcelo marcelosouza com) (2 replies)
Loganalysis folks,

Which tool do you really recommend for windows eventlog to unix
syslog translation?

I've been thinking about Snare, but I'd like to hear your opinion.

Thanks in advance.

--
Marcelo de Souza
_______________________________________________
LogAnalysis mailing list
LogAnal

[ more ]  [ reply ]
Re: [logs] Eventlog to syslog 2008-02-29
Anton Chuvakin (anton chuvakin org) (2 replies)
RE: [logs] Eventlog to syslog 2008-02-29
Rainer Gerhards (rgerhards hq adiscon com)
Re: [logs] Eventlog to syslog 2008-02-29
Daniel Cid (dcid ossec net)
Re: [logs] Eventlog to syslog 2008-02-29
tbird precision-guesswork com (2 replies)
Re: [logs] Eventlog to syslog 2008-02-29
David Corlette (DCorlette novell com) (1 replies)
[logs] wny not syslog on microsoft platforms 2008-02-29
Rodney Thayer (rodney canola-jones com)
Re: [logs] Eventlog to syslog 2008-02-29
Rodney Thayer (rodney canola-jones com) (2 replies)
Re: [logs] Eventlog to syslog 2008-02-29
Anton Chuvakin (anton chuvakin org) (1 replies)
Re: [logs] Eventlog to syslog 2008-02-29
Marcus J. Ranum (mjr ranum com)
Re: [logs] Eventlog to syslog 2008-02-29
tbird precision-guesswork com (2 replies)
Re: [logs] Eventlog to syslog 2008-02-29
David Corlette (DCorlette novell com)
Re: [logs] Eventlog to syslog 2008-02-29
Andrew Hay (andrewsmhay gmail com) (2 replies)
Re: [logs] Eventlog to syslog 2008-03-01
A Ananth (ananth802 yahoo com) (1 replies)
Re: [logs] Eventlog to syslog 2008-03-01
Andrew Hay (andrewsmhay gmail com) (2 replies)
Re: [logs] Eventlog to syslog 2008-03-02
Rodney Thayer (rodney canola-jones com)
Re: [logs] Eventlog to syslog 2008-03-01
A Ananth (ananth802 yahoo com)
Re: [logs] Eventlog to syslog 2008-03-01
Rodney Thayer (rodney canola-jones com)
[logs] Lunch and Learn: Use IT Search for Availability, Security andCompliance 2008-02-27
Dee-Ann LeBlanc (dee splunk com)
Lunch and Learn: Use IT Search for Availability, Security and Compliance

Find out how Trevis Edgeworth, Senior Director, Network for Epsilon,
and Dennis Scales from Fidelity National Information Services are
using Splunk IT Search for availability, security and compliance
across complex appli

[ more ]  [ reply ]
[logs] CanSecWest 2008 Mar 26-28 2008-02-22
Dragos Ruiu (dr kyx net) (1 replies)
CanSecWest 2008 Presentations

Snort 3.0 - Marty Roesch, Sourcefire

Cross-Site Scripting Vulnerabilities in Flash Authoring Tools - Rich
Cannings, Google

Proprietary RFID Systems - Jan "starbug" Krissler and Karsten Nohl, CCC

Media Frenzy: Finding Bugs in Windows Media Software - Mark Dowd and

[ more ]  [ reply ]
Re: [logs] CanSecWest 2008 Mar 26-28 2008-02-23
Anton Chuvakin (anton chuvakin org) (1 replies)
Re: [logs] CanSecWest 2008 Mar 26-28 2008-02-23
Dragos Ruiu (dr kyx net) (1 replies)
Re: [logs] CanSecWest 2008 Mar 26-28 2008-02-23
Andrew Hay (andrewsmhay gmail com)
Re: [logs] Information about Cisco ASA "Firewall Server" messages 2008-02-15
Anusuya K (anusuya_k yahoo com)
Thanks for replying. But my concern is more about the term "Security appliance server", and how is it different from "Security appliance" (I guess in PIX it would be Firewall server vs Firewall).

Thanks
Anusuya

----- Original Message ----
From: "ronaldo (at) cheetah.netrusion (dot) com [email concealed]" <ronaldo (at) cheetah (dot) ne [email concealed]

[ more ]  [ reply ]
[logs] Information about Cisco ASA "Firewall Server" messages 2008-02-15
Anusuya K (anusuya_k yahoo com)
Hi,
While analyzing the Cisco ASA 8.0 log messages I came across some VPN messages which refer to firewall server/Security appliance server. Following are some of them:

%PIX|ASA-7-713160: Remote user (session Id - id) has been granted access by the Firewall Server
%PIX|ASA-3-713161: Remote user

[ more ]  [ reply ]
(Page 6 of 91)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus