Submit a ticketCall us

Get a crash course on Network Monitoring delivered right to your inbox
This free 7-day email course provides a primer to the philosophy, theory, and fundamental concepts involved in IT monitoring. Lessons will explain not only how to perform various monitoring tasks, but why and when you should use them. Sign up now.

Home > Success Center > Log & Event Manager (LEM) > SolarWinds LEM 6.3 User Guide > Monitoring network security with LEM > Leverage the Incidents report in security audits

Leverage the Incidents report in security audits

Table of contents
No headers

Auditors typically require that IT administrators review the critical events on their networks on a daily basis. Create a method for reviewing these events by using Incident events as described earlier. After you define your critical network events as Incidents, schedule the Incidents report to run daily and follow the procedure below to maintain a paper trail to use during your security audits.

SolarWinds recommends scheduling reports to run on a daily basis, including the Incidents report.

To maintain a paper trail for your security audits using the daily Incidents report:

  1. Open the Incidents report every day for the previous day.
  2. Print the report and review its contents.
  3. Document any action you performed as a result and sign the report.
  4. File the printed and signed report in a safe location for your next security audit.

 

 
Last modified
17:12, 26 Jan 2017

Tags

Classifications

Public