{"id":7218,"date":"2021-03-11T10:19:29","date_gmt":"2021-03-11T16:19:29","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=7218"},"modified":"2020-10-27T11:40:42","modified_gmt":"2020-10-27T16:40:42","slug":"what-you-need-to-know-about-server-security-in-2021","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/what-you-need-to-know-about-server-security-in-2021\/","title":{"rendered":"What You Need to Know About Server Security in 2021"},"content":{"rendered":"<p>How often do you check your <a href=\"https:\/\/www.poweradmin.com\/products\/server-monitoring\/?f=e\">event log monitor<\/a> for potential security breaches? Did you know that many potential security breaches, events, and other problems are logged to event logs? Unfortunately, even the most skilled IT professionals have a hard time making sense of what to watch for that could indicate security issues or even a potential breach until it is too late.<\/p>\n<p>\u00a0<\/p>\n<p>Event logs contain a ton of information that can be useful. Yet, it requires knowing how to monitor the event log, what to look for, and when to conduct regular audits. Most businesses lack the resources and time needed to review event logs daily, let alone weekly.<\/p>\n<p>\u00a0<\/p>\n<p>The best-case scenario for many businesses is a monthly review. Even still, this does not always occur. Therefore, security breaches frequently are not discovered for weeks or even months! With hackers constantly evolving, you need to stay on top of your server security.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7221\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/1.jpg\" alt=\"\" width=\"1000\" height=\"666\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/1.jpg 1000w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/1-300x200.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/1-768x511.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\"><\/a><\/p>\n<p>What can you do to protect your data and your servers? Get <a href=\"https:\/\/www.poweradmin.com\/help\/pa-server-monitor-8-1\/monitor_event_log.aspx\">PA Server Monitor<\/a>. This server monitoring software is easy to set up and configure so you can capture the types of event log data you need.<\/p>\n<p>\u00a0<\/p>\n<p>You can create customized event monitoring for specific events too. Once your monitoring software is set up, configured, and active, it takes the guesswork out of knowing which events could signify a security issue or breach.<\/p>\n<h2><strong>Be Alerted to Questionable Activity as It Occurs<\/strong><\/h2>\n<p>Another great feature of PA Server Monitor is the ability to enable alerts when specific events occur. You don\u2019t have to wait to review event logs. You can receive a notification even while the event is occurring! You decide for whom and how the alert is configured, such as by email, text, phone, etc.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/2-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7222\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/2-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1707\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/2-scaled.jpg 2560w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/2-300x200.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/2-1024x683.jpg 1024w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/2-768x512.jpg 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/2-1536x1024.jpg 1536w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2021\/03\/2-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\"><\/a><\/p>\n<h2><strong>What Types of Events Can Be Monitored?<\/strong><\/h2>\n<p>Any type of event that generates an event log can be monitored. Ideally, you\u2019ll want to configure the monitoring software for these types of events:<\/p>\n<ul>\n<li><strong>Account Lockouts<\/strong> \u2013 This could indicate someone is attempting to hack into your network.<\/li>\n<li><strong>Changes in User Permissions<\/strong> \u2013 Unexplained changes in user permissions could indicate malware or other security issues.<\/li>\n<li><strong>Account Creation<\/strong> \u2013 The creation of new accounts that you did not authorize could also indicate a security issue.<\/li>\n<li><strong>Account Deletion<\/strong> \u2013 The deletion of accounts might indicate malicious hacking or other security concerns.<\/li>\n<li><strong>Event Log Clearing<\/strong> \u2013 If event logs are erased, it could indicate someone is attempting to hide what they have been doing.<\/li>\n<li><strong>Changes in System Audit Policies<\/strong> \u2013 Any change to a system audit policy could indicate malicious intentions.<\/li>\n<li><strong>Application Errors<\/strong> \u2013 You\u2019ll want to monitor various application errors, as these could indicate potential attacks.<\/li>\n<li><strong>Changes to Firewall Settings\/Rules<\/strong> \u2013 Any changes made to firewall settings and rules could indicate a security breach is in progress.<\/li>\n<li><strong>Active Directory Policies Ignored<\/strong> \u2013 When a workstation fails to have Active Directory policies applied to it, it often indicates a compromised workstation.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>Keep in mind, this list is just the more common types of events you should monitor and receive an alert for when you use PA Server Monitor. You may have others, based on the type of business operation, your specific security concerns, and so on.<\/p>\n<p>\u00a0<\/p>\n<p>For further information about PA Server Monitor, our other <a href=\"https:\/\/www.poweradmin.com\/\">server monitoring software<\/a>, or to request your FREE, no-obligation, full-access 30-day free trial, please feel free to contact Power Admin at 1-800-401-2339 today!<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How often do you check your event log monitor for potential security breaches? Did you know that many potential security breaches, events, and other problems are logged to event logs? Unfortunately, even the most skilled IT professionals have a hard time making sense of what to watch for that could indicate security issues or even [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7222,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,42,6],"tags":[],"class_list":["post-7218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-power-admin","category-security","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/7218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=7218"}],"version-history":[{"count":3,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/7218\/revisions"}],"predecessor-version":[{"id":7223,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/7218\/revisions\/7223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/7222"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=7218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=7218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=7218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}