Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: November 29th, 2022

Application In Information Security

Computer Sciences & Information Technology
Application In Information Security
From a Windows 10 command prompt, type eventvwr.msc and press Enter. This will open the Windows 10 Event Viewer. Explore the different logs and write a report summarizing your findings as they relate to host intrusion detection and event logging/auditing (for performance and security).

From a Windows 10 command prompt, type eventvwr.msc and press Enter. This will open the Windows 10 Event Viewer. Explore the different logs and write a report summarizing your findings as they relate to host intrusion detection and event logging/auditing (for performance and security).

The event viewer tool is used in summing up the event logs from the network system and the applications into an appropriate structure so that the troubleshoot problems can be analyzed and fixed. The intrusion detection system is used in securing networks from intrusions (Barath, 2017). The system will track and identify the attacks within the network then analyze them via the logs of the IDS systems. Thus, the event viewer could be used to track the events in three levels: the error logs, the warning logs and the information logs.
Through the event IDs, the system can communicate on the applications that are running hence improving the threat detection activities fundamental for security. The Event ID 4688 lists every process to be executed by the system and generated by a user. An example of that is when there is malware within the system then this event indicates that the process is being executed by the program. Events ID 5154 is used in generating a record when the Windows filtering platform allows the application to look into a port for incoming connections. Event ID 5156 displayed the record of when the Windows Filtering program allows the program to remotely or locally bind another process. Event ID 5158 occurs when a record is generated after a server or client application connects with the port (Barath, 2017). Event ID 4670 is used in identifying unauthorized access through observations in the change in file permissions. A record is generated when the user changes the access control list to an object. Event ID 1125 aids in monitoring failures related to the policy applications among other changes to the policy in Active directory.
The Windows firewall provided the line of defense considering a hacker could change the rules in order to obtain system access. Thus, the firewall logging feature could be used in checking the disabled port openings and aiding in analyzing the data packets on the route.

References:
Baráth, J. (2017, October). Optimizing windows 10 logging to detect network security threats. In 2017 Communication and Information Technologies (KIT) (pp. 1-4). IEEE.

Order | Check Discount

Tags: Application In Information Security

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00