Marty
2009-05-11 15:36:10 UTC
We have a security requirement which someone suggested SCOM can accomplish
out of the box. If I understand correctly this works if the affected
computers have audit collection enabled and are configured so that audit
collection events are triggered when log data is changed, such as a user
changing data in an application log. Does this sound like something SCOM ACS
can accomplish or is this not something for which an audit log event can be
triggered?
Thanks!
"Use file integrity monitoring and change detection software on logs to
ensure that existing log data cannot be changed without generating alerts
(although new data being added should not cause an alert)."
out of the box. If I understand correctly this works if the affected
computers have audit collection enabled and are configured so that audit
collection events are triggered when log data is changed, such as a user
changing data in an application log. Does this sound like something SCOM ACS
can accomplish or is this not something for which an audit log event can be
triggered?
Thanks!
"Use file integrity monitoring and change detection software on logs to
ensure that existing log data cannot be changed without generating alerts
(although new data being added should not cause an alert)."