13 — Network Monitoring and Defense
11 safeguards in the Network Monitoring and Defense control
13.1Centralize Security Event Alerting
13.2Deploy a Host-Based Intrusion Detection Solution
13.3Deploy a Network Intrusion Detection Solution
13.4Perform Traffic Filtering Between Network Segments
13.5Manage Access Control for Remote Assets
13.6Collect Network Traffic Flow Logs
13.7Deploy a Host-Based Intrusion Prevention Solution
13.8Deploy a Network Intrusion Prevention Solution
13.9Deploy Port-Level Access Control
13.10Perform Application Layer Filtering
13.11Tune Security Event Alerting Thresholds