Overview
Students will identify access to a PFSENSE firewall through the forwarding of SYSLOG (System logs) from a Firewall to the SYSLOG service we have configured and set up on the Network. Students will then identify malicious activity through system logs.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468e86e02470606708e56db_Identify_Access_to_a_LINUX_Firewall_Through_SYSLOG_Service.jpeg)
Learning Partner
![CYBRScore](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64744bb1dac63cc4698c7781_browse-cybrscore-logo.png)
CYBRScore
Cybersecurity Technical Hands-on Labs