On Tue, Jan 27, 2009 at 9:13 AM, Mark Boersma <ma...@triangle-inc.com> wrote:
> The typical logging of which programs are run and what is used on a machine.

  Don't forget that the Security audit log can be used to track
process starts and exits.  It's not a substitute for full scale "big
brother" logging, but it's got its applications.  It may be worthwhile
enabling it on all workstations, just so you have some records
available.  In addition to "big brother", it can be useful for
trouble-shooting, to correlate problems with activities.  If you do
enable it everywhere for this purpose, be sure to increase the
security log max size, and set the rotation to overwrite as needed
(rather than the default of only after seven days).

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to