SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis is a guide on how to identify intrusions using Microsoft's Proxy Server log files. MS Proxy Server is an extensible firewall that provides passive defense against intrusions and functions as a gateway between an internal network and the Internet. This configuration allows clients to share a common connection point to the Internet. Installing a MS Proxy Server between the Internet and an internal network provides packet-filtering services that will stop various types of protocols from entering the network. With the use of MS Proxy Server log files, system administrators can monitor and track all packets passing through the MS Proxy Server.