|
I understand that Powerlock Network Security product will provide exit-point logging for free. You have to pay for a license only if you need to set up access rules. The audit logs are quite useful and seem to catch everything we've thrown at it. Check it out at: http://www.powertechgroup.com/networksecurity.html or at http://www.softlanding.com/powerlock/index.htm Eric DeLong Sally Beauty Company MIS-Sr. Programmer/Analyst 940-898-7863 or ext. 1863 -----Original Message----- From: Harry D. Angkasa [mailto:harry@bniaga.co.id] Sent: Tuesday, November 20, 2001 1:52 AM To: MIDRANGE-L@midrange.com Subject: Client Access Securing & Logging This is a multi-part message in MIME format. -- [ Picked text/plain from multipart/alternative ] I need to log all client access (operation navigator and transfer file) request? I need also to reject some of that requests, i.e. changing security policy, remote command, etc. What product should we use to fulfil this? besat regards, Harry D. Angkasa -- _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@midrange.com To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l or email: MIDRANGE-L-request@midrange.com Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.