[<prev] [next>] [day] [month] [year] [list]
Message-ID: <B24F5C4EDA48D511B6CB00508BDFC194081B9A48@nyexchclstr.thrupoint.net>
From: JBrown at thrupoint.net (Brown, James (Jim))
Subject: Enterprise Access Log Scanning Tools
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
To: 'full-disclosure@...ts.netsys.com'
Sent: 10/19/04 2:03 PM
Subject: [Full-Disclosure] Enterprise Access Log Scanning Tools
Greetings all,
Does anyone have (1) any experience, (2) any suggestions, or (3) an
appropriate contact to these types of tools? The requirements include
ACE and NT Domain access logs.
Thank You,
Michael Cullen
Senior Security Engineer
Technical Architecture, Policy and Web Services
Universal Music Group
(818) 777-4049
http://www.loganalysis.org
Check the library section.
Jim B.
Note: The information contained in this message may be privileged and
confidential and protected from disclosure. If the reader of this message
is not the intended recipient, or an employee or agent responsible for
delivering this message to the intended recipient, you are hereby notified
that any dissemination, distribution or copying of this communication is
strictly prohibited. If you have received this communication in error,
please notify us immediately by replying to the message and deleting it from
your computer. Thank you. ThruPoint, Inc.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041019/7e352916/attachment.html
Powered by blists - more mailing lists