When you read the log for suspicious activities, what exactly you look for?
All I look is Wingate NAT. Even inside of Wingate NAT, I still don't know how to determine whethere someone got in.
Please educate me more.
Thanks,
xeo
Moderator: Qbik Staff
Users browsing this forum: Bing [Bot] and 2 guests