2.5.6. various settingsΒΆ

After completing the policy application, please make appropriate configuration changes for each computer while checking Manual / Reference Information . Also, check the contents of the event that has occurred in the system event after applying the policy, and change it to the setting value suitable for the environment.
This section describes the recommended search procedure for "Intrusion Prevention", "Change Monitoring" and "Security Log Monitoring", and the baseline creation procedure for "Change Monitoring".