This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

STEP 9

Log and Monitor

Use the tools in this toolbox to log and monitor activity on your network, so that you can track security status and identify issues.

Lastly, it’s important to remember that security cannot be a “one and done” approach. You have to continuously monitor what’s going on within your environment. Collecting, managing and analyzing data logs are important ways to identify normal vs. anomalous activity and can help you detect, understand and recover from an attack. Use these tools to automate this process.

9.1 Collect and Manage Logs

Narrow your search by selecting your OS
Athenian Project
Type
2
Level
0h 30min
Time

The Athenian Project: Cloudflare's Logpull & Logpush

Use this tool to collect and manage the detailed log of HTTP requests.

Microsoft AccountGuard
Type
1
Level
0h 30min
Time

Microsoft AccountGuard

Use this tool for securing and monitoring Office365 environments.

Type
4
Level
5h 0min
Time

Albert Network Monitoring

Use this intrusion detection system tool for comprehensive, 24/7 network monitoring and notifications of malicious activity.

Type
2
Level
3h 0min
Time

McAfee Skyhigh Security Cloud for State Election Officials

Use this tool for data monitoring, auditing and remediation for election officials.

Type
3
Level
1h 0min
Time

Graylog

Use this tool to collect and analyze log data.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

CTCL logo

Cybersecurity 101 for Election Officials

Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...

Read More
CTCL logo

Cybersecurity 201 for Election Officials

Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...

Read More