Educause Security Discussion mailing list archives
Re: HEOA Question
From: Eme Ejike <eejike () ODU EDU>
Date: Mon, 31 Jan 2011 10:11:09 -0500
The DMCA response processes tends to be customized to your environment and logging capacity. We are able to tie user names to incidents using custom perl scripts and parsing algorithms that collate logs in the data collection process. The network Perimeter logs reports on the corresponding internal IP tied to the NAT at a specific time period. Hence log time frame matches. I know this isn't a tool but it is information to point you in the right processing direction.
Eme Ejike Enterprise Systems Security Officer Old Dominion University Norfolk,Va 757-683-6755
Current thread:
- HEOA Question William Derwostyp (Jan 31)
- Re: HEOA Question Matthew Gracie (Jan 31)
- Re: HEOA Question Eme Ejike (Jan 31)
- Re: HEOA Question Kevin Wilcox (Jan 31)
- Re: HEOA Question SCHALIP, MICHAEL (Jan 31)
- Re: HEOA Question Steve Worona (Feb 01)
- Re: HEOA Question Bulanda, Dave G (Jan 31)
- Re: HEOA Question Gioia, Matthew P. (Jan 31)
- Re: HEOA Question Bulanda, Dave G (Jan 31)
- Re: HEOA Question Harry E Flowers (flowers) (Feb 02)
- Re: HEOA Question Dave Inman (Feb 03)
- Re: HEOA Question Gioia, Matthew P. (Jan 31)
- Re: HEOA Question Matthew Gracie (Jan 31)
- Re: HEOA Question Cal Frye (Jan 31)