Product manual
GFI EventsManager 3 Achieving Results | 62
3 Achieving Results
This chapter provides information on how to use GFI EventsManager to achieve results. The
information provided helps you conduct positive forensic investigations and system monitoring. It also
enables you to achieve positive legal compliance results, while ensuring network security at all times.
Topics in this chapter:
3.1 Achieving Network Security 62
3.2 Effective System Health Monitoring 64
3.3 Achieving PCIDSS Compliance 66
3.1 Achieving Network Security
Many companies mistakenly assume that unauthorized access is an external threat only. The majority
of corporate security threats actually stem from internal sources, against which a firewall offers no
protection. A good security strategy includes real-time monitoring for critical security events and
periodic analysis of your systems' security logs so that you can detect and respond quickly to attacks.
Network security is defined as a set of rules and policies adopted by a network administrator to
monitor and prevent misuse and unauthorized access of a network. For an effective secure network
strategy follow the steps described below:
1. Add Management Console Users and Groups
GFI EventsManager can be managed by multiple users. You can link console activity to different
users by creating a user for each person who is accessing the console and making changes to
configurations.
Create users to be able to audit individual activity. For more information refer to Managing
user accounts.
Create user groups so that multiple users can be managed at once. For more information refer
to Managing user groups.
2. Configure console security options
GFI EventsManager enables you to configure console security options to facilitate securing
sensitive information.
Enable GFI EventsManager login system so that users can be tracked individually. For more
information refer to Enabling the login system.
Configure anonymization options so that unauthorized users are not able to view sensitive
information within the management console. For more information refer to Anonymization.
Enable user auditing so that an activity log can be created for each user who changes system
configurations. For more information refer to Auditing console activity.