Overview
In this lab, you will assume the role of a Network and Security Administrator who will manage the auditing process of the IT environment. The process includes reviewing effective permissions, defining a file system audit policy, and configuring centralized logging.
Learning Partner
Skillable
Ready-built content across a variety of topics and technologies