Abstract
This chapter discusses how to configure logging and event data to capture the information you need to be able to show and maintain PCI compliance, as well as how to perform other security monitoring tasks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have