Reviewed: January 11, 2010
To ensure confidentiality, integrity, and availability of their information resources, a department must have a strategy to monitor systems and follow-up on unusual computer activity and events.
Departmental management, technology staff, and users.
- Enable appropriate system event logging and other monitoring tools, as applicable.
- Review event logs according to appropriate schedule (based on the role of the system).
- Report unusual activity to appropriate personnel.
- Raise end-user awareness to monitor odd or unusual activity.