This article discusses the discovery of compromised machines in large enterprise environments, and offers some suggestions on correlating NIDS and HIPS logs to avoid false positives.
http://www.securityfocus.com/infocus/1808
Results 1 to 1 of 1
Threaded View
|
|