Overview
In this lab, you will assume the role of a Network and Security Administrator who will manage the auditing process of the IT environment. The process includes reviewing effective permissions, defining a file system audit policy, and configuring centralized logging.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468ef14530061f6ccabff05_Lab_Cards400.png)
Learning Partner
Skillable
Ready-built content across a variety of topics and technologies