<img src="https://secure.leadforensics.com/70528.png" alt="" style="display:none;">

EBOOK
Audit Policy for Compliance

NNT Audit Policy Guide

 

The use of the audit policy to generate audit logs is an essential best practice for compliance and security.

NNT have put together the following audit policies, based on expert guidance, including – Microsoft, RedHat, Center for Internet Security, Oracle, SUSE and our experienced PCI QSA/Security Auditor partners.

To enable logging of all relevant security events to underpin your security policy, it is necessary to configure the audit rules files or the local security policy for the server/workstation. Get started now by downloading our Security Control Guide - Audit Policy for Compliance.