Identify Suspicous Activity on your Edge Device

Logs provide much useful information that can help you track down the source of suspcious activity (for example, numerous denied connections from a particular IP address). In this TechNet blog post, Yuri Diogenes explains how to use built in Windows tools such as the Event Log and Network Monitor to investigate suspicous activity on your edge device.

http://blogs.technet.com/b/yuridiogenes/archive/2011/06/02/identifying-suspicious-activity-on-your-edge-device-part-1.aspx

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top