No proxy or NAT session logs are in place. The thing we never log is your traffic that goes through our servers. Standard operating practice at every security-minded house. These things happen even to the best of us at times, and it's good to be prepared. It's there mostly as a backup, so that we have audit logs in case one of our servers would be hacked or abused, so that we have some method to investigate what happened. There's a rather simple centralised, secured syslog server (syslog over TLS), but I wouldn't call it SIEM. Follow us on Twitter or Like us on Facebook!įacebook Twitter Instagram Calendar Please check out our Rules and FAQs.Email us at Step-by-step guide to doing an AMA.See more on our comment removals policy here.Attempting to bypass this rule by adding a ? to a non question will result in a permanent ban.All initial responses to posters must contain a properly punctuated question.Requests should be posted in /r/IAmARequests.See here for tips concerning proof and examples. If it must remain confidential, you can submit proof on our website so we can verify you and your claims.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |