Manage Auditing

In this lab, you will assume the role of a Network and Security Administrator who will manage the auditing process of the IT environment. The process includes reviewing effective permissions, defining a file system audit policy, and configuring centralized logging.

Time
45 minutes
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

In this lab, you will assume the role of a Network and Security Administrator who will manage the auditing process of the IT environment. The process includes reviewing effective permissions, defining a file system audit policy, and configuring centralized logging.