Ohio State’s Enterprise Security team provides a no-cost Log Management Hosting service to help IT professionals collect machine data from sources such as computer systems, networking equipment and web sites in order to capture access and other security-related events. This data is retained in accordance with OSU and Security Framework requirements. The data is available to assist IT professionals with reviewing anomalies and promptly identifying problems with systems under their purview.
Author: Charlie Smith
The best way to keep Ohio State’s information systems safe is by working together. That’s why Enterprise Security has released updated versions of Ohio State’s Information Security Standard (ISS) and Information Security Control Requirements (ISCR).