STEP 9
Log and Monitor
Use the tools in this toolbox to log and monitor activity on your network, so that you can track security status and identify issues.
Use this tool to collect and manage the detailed log of HTTP requests.
Use this intrusion detection system tool for comprehensive, 24/7 network monitoring and notifications of malicious activity.
Use this tool for data monitoring, auditing and remediation for election officials.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...
Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.
Contact Us
[email protected]
Community Forum
https://community.globalcyberalliance.org/