Identifying Suspicious Activity on your Edge Device – Part 1

by [Published on 6 July 2011 / Last Updated on 6 July 2011]

“Most of the good firewalls out there have the capability to identify suspicious activity and log this information for you. However, there are some scenarios where you want more than just knowing what happened, you want to build a better footprint of the potential attack that the edge device is passing through. This post will explain how to combine the power of Event Viewer with the flexibility of Network Monitor Wizard to build trigger an action when an incident happen. To achieve that we will divide the post in two parts, this part one will explain the scenario, identify the issue and work on the data gathering process. For this post we will use Forefront TMG 2010 as our edge device; however the same approach can be used in any device that logs its major alerts to Windows Event Log…”

For the juicy details, check out Yuri Diogenes’ blog over at:



MVP (Enterprise Security)

See Also

Review and Comments

* Required field

The Author — Debra Shinder

Debra Shinder avatar

DEBRA LITTLEJOHN SHINDER, MCSE, MVP (Security) is a technology consultant, trainer and writer who has authored a number of books on computer operating systems, networking, and security.

Featured Links