networking , security

Network Monitoring Review Considerations

December 22, 2011

This is a method of discovering monitored access points to an organization and its assets through discovery of network monitoring. 

Expected Results:

1)      List of monitored access points

2)      Types of monitoring

3)      List of unmonitored standard and privileged access points

4)      List of alarm triggers