14. Audit Logs

Network managers should ensure that their system is able to create an audit log.

An audit log will record every important event in an 'audit file. It can record things such as:

  • Who logged on to the system at what time and onto which computer
  • Which files were opened, altered, saved or deleted
  • Log events such as attempts to access proxy servers

For example an audit record may look like this:-

User: bigears233

File: TheMostImportantFile.doc

Changed: 3rd January 10:15am

(or Deleted, or Saved).

If there is ever a problem and an employee is suspected of accessing and damaging files then the audit log should be able to provide evidence of who, when and where.

If a hacker is suspected of trying to break through the firewall then the audit log can identify the ports that were used. The network manager can then block future access to those ports.

 

challenge see if you can find out one extra fact on this topic that we haven't already told you

Click on this link: Audit Logs