This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

STEP 9

Log and Monitor

Use the tools in this toolbox to log and monitor activity on your network, so that you can track security status and identify issues.

Lastly, it’s important to remember that security cannot be a “one and done” approach. You have to continuously monitor what’s going on within your environment. Collecting, managing and analyzing data logs are important ways to identify normal vs. anomalous activity and can help you detect, understand and recover from an attack. Use these tools to automate this process.

9.1 Collect and Manage Logs

Narrow your search by selecting your OS
Type
4
Level
5h 0min
Time

Albert Network Monitoring

Use this intrusion detection system tool for comprehensive, 24/7 network monitoring and notifications of malicious activity.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

CTCL logo

Cybersecurity 101 for Election Officials

Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...

Read More
CTCL logo

Cybersecurity 201 for Election Officials

Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...

Read More