Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security management, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
Dear all, I want to know what is the step to audit an antivirus product. What will be the plan of action?
I would like to find out what is the most successfully used antivirus software other companies, running a Novell Netware Server, have deployed on their servers. I am assessing whether to change the current AV software or keep it. Any feed back would be most appreciated.
How to properly moniter windows servers.