Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Log Aggregation and Monitoring

Information Security provides Log Aggregation and Monitoring services using ArcSight. 

Why would I send my logs to Information Security?

  • If you don't have space for your records
  • If you want to keep records for longer than the system default
  • If you want a better search interface for your logs
  • If you want to aggregate or compare between logs
  • If you want to monitor your logs and create alerts for certain events

How long will Information Security keep these logs?

Services We Provide

Contact us for these services

UIT and ITS Services

For

Getting Help

Whole Disk Encryption

Faculty, Staff, Students, Affiliates

 Frontline Support Providers

Security Incident Response

Faculty, Staff

information_security@tufts.edu

Forensic Investigation (with approvals)

Faculty, Staff

information_security@tufts.edu

Identity Finder/ Information Security

Faculty, Staff, Students, Affiliates

Information Stewards

Secure Destruction

Faculty, Staff

Information Stewards

Information Security Training

Service Owners

 

Log Aggregation and Monitoring

Service Owners

information_security@tufts.edu

Sensitive Information Business Practices Review

Staff

information_security@tufts.edu

Additional Services (self-provided)

UIT and ITS Services

For

Getting Help

Mobile Device Security

Faculty, Staff, Students, Affiliates

information_security@tufts.edu 

Information Security Training

Service Owners

 

Application Security Self Scanning

Service Owners

information_security@tufts.edu 

Network Security Self Scanning

Service Owners

information_security@tufts.edu 

How to Contact Us

  • No labels