Changes

Choose a hosting provider

731 bytes added, 9 years ago
/* Mitigation */
</li>
<li>
Logging and Auditingis a key aspect of server security. All hacking, brute force, DDoS or other attacks should be captured, monitored and analysed. <br>This [http:/li/www.cyberciti.biz/faq/linux-log-files-location-and-how-do-i-view-logs-files/| guide] describes the location and purpose of common Linux log files. <brTo ensure that information is not lost, overwritten or that the logs do not grow infinitely the tool [http://www.thegeekstuff.com/2010/07/logrotate-examples/| Logrotate] can be used.<libr>AntiInstalling a tool like Logwatch allows you to monitor and respond to suspicious activity. The following [https://www.digitalocean.com/community/articles/how-intrusion system,to-install-and-use-logwatch-log-analyzer-and-reporter-on-a-vps| guide] describes installing and configuring Logwatch.
</li>
<li>