



The 2012 Verizon Data Breach report found that even though 85 percent of breaches took several weeks to be noticed, 84 percent of victims had evidence of the breach in their event logs. This lack of monitoring active event logs remains a consistent weakness in many companies' security defense plans. The opportunity for detection is there investigators noted that 66 percent of victims had sufficient evidence available within their logs to discover the breach had they been more diligent in analyzing such resources."

"The apparent ineffectiveness of event monitoring and log analysis continues to be somewhat of an enigma. For example, the 2009 Verizon Data Breach Report states: Independent reports have long supported this conclusion. Many computer security compromises could be discovered early in the event if the victims enacted appropriate event log monitoring and alerting. 10 Immutable Laws of Security AdministrationĪ solid event log monitoring system is a crucial part of any secure Active Directory design. Law Number Five: Eternal vigilance is the price of security. Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012
