SlideShare a Scribd company logo
Firewalls
Introduction
 A firewall is a protective layer for your server that
monitors and filters incoming and outgoing network traffic.
It uses a set of rules to determine to allow or block specific
network traffic.
 Firewalls can prevent unauthorized use before reaching
your servers.
 Firewalls can be hardware or software based.
Why need of Firewalls
 To protect confidential information from those who do not explicitly need to
access it.
 To protect our network & its resources from malicious users & accidents that
originate outside of our network.
 A firewall keeps destructive and disruptive forces out, and controls the
incoming and outgoing network traffic based on security parameters that you
can control and refine.
Types Of Firewalls
A. Hardware Firewall
 It is a physical device. More secure
 It can be installed between the modem and computer.
 It can be incorporated into a broadband router being used to share the
internet connection.
 E.g.- Cisco pix, netscreen, watchfuard etc.
B. Software Firewall
 It is a software application
 It is installed onto the computer system that you wish to protect
 Protect a single computer
 This is usually the computer with modem attached to it.
 E.g.- Norton internet security, MacAfee internet security etc.
 Simple to install and upgrade
 Takes up no physical space
Access Control List
(ACL)
 An access control list (ACL) contains rules that grant or deny access to certain
digital environments. There are two types of ACLs:
 Filesystem ACLs━filter access to files and/or directories. Filesystem
ACLs tell operating systems which users can access the system, and what
privileges the users are allowed.
 Networking ACLs━filter access to the network. Networking ACLs tell
routers and switches which type of traffic can access the network, and which
activity is allowed.
 ACLs were the only way to achieve firewall protection
 ACL Types – Standard and Extended ACL.
Packet Filtering
 Packet filtering is a firewall technique used to control network access by
monitoring outgoing and incoming packets and allowing them to pass or halt
based on the source and destination Internet Protocol (IP) addresses,
protocols and ports
 Packet filtering is fairly effective & transparent to users, but it is difficult to
configure.
 Packet-filtering firewalls operate at the network layer (Layer 3) of the OSI
model. Packet-filtering firewalls make processing decisions based on network
addresses, ports, or protocols.
 Packet filtering checks source and destination IP addresses. If both IP
addresses match, the packet is considered secure and verified
DEMILITARIZED ZONE
(DMZ)
 A DMZ, short for demilitarized zone, also sometimes known as a perimeter
network or a screened subnetwork is a network (physical or logical) used to
connect hosts that provide an interface to an untrusted external network –
usually the internet – while keeping the internal, private network – usually
the corporate network – separated and isolated form the external network.
 The DMZ is isolated using a security gateway (i.e. firewall) to filter traffic
between the DMZ and the private network.
 The ultimate goal of a DMZ is to allow access to resources from untrusted
networks while keeping the private network secured.
Alerts and Audit Trials
 A firewall alert pop-up appears on your computer screen when
the firewall detects suspicious network traffic on your computer.
 Firewall Analyzer lets you to administer the triggered alerts, so that the
network administrators take care of the triggered alerts and carry out
remediation if required.
 Audit trails are the manual or electronic records that chronologically catalog
events or procedures to provide support documentation and history that is
used to authenticate security and operational actions, or mitigate challenges
 Audit trails can also identify areas of non-compliance by providing
information for audit investigations.
 Audit trail records will contain details that include date, time, and user
information associated with the transaction
THANK YOU

More Related Content

What's hot

Burp suite
Burp suiteBurp suite
Burp suite
Ammar WK
 
Web security
Web securityWeb security
Web security
Padam Banthia
 
AWS Webcast - What is Cloud Computing with AWS
AWS Webcast - What is Cloud Computing with AWSAWS Webcast - What is Cloud Computing with AWS
AWS Webcast - What is Cloud Computing with AWS
Amazon Web Services
 
Web security
Web securityWeb security
Web security
Subhash Basistha
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
 
AAA server
AAA serverAAA server
AAA server
hetvi naik
 
Firewall
Firewall Firewall
Email security
Email securityEmail security
Email security
Baliram Yadav
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Web security
Web securityWeb security
Web security
kareem zock
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
Java RMI
Java RMIJava RMI
Java RMI
Prajakta Nimje
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Secure Cloud Storage
Secure Cloud StorageSecure Cloud Storage
Secure Cloud Storage
ALIN BABU
 
Types of access control systems
Types of access control systemsTypes of access control systems
Types of access control systems
SecurePass
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 

What's hot (20)

Burp suite
Burp suiteBurp suite
Burp suite
 
Web security
Web securityWeb security
Web security
 
AWS Webcast - What is Cloud Computing with AWS
AWS Webcast - What is Cloud Computing with AWSAWS Webcast - What is Cloud Computing with AWS
AWS Webcast - What is Cloud Computing with AWS
 
Web security
Web securityWeb security
Web security
 
Network security
Network securityNetwork security
Network security
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
AAA server
AAA serverAAA server
AAA server
 
Firewall
Firewall Firewall
Firewall
 
Email security
Email securityEmail security
Email security
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Web security
Web securityWeb security
Web security
 
Web Security
Web SecurityWeb Security
Web Security
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Java RMI
Java RMIJava RMI
Java RMI
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Secure Cloud Storage
Secure Cloud StorageSecure Cloud Storage
Secure Cloud Storage
 
Types of access control systems
Types of access control systemsTypes of access control systems
Types of access control systems
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network Security Network Security
Network Security
 

Similar to Fire walls

Firewall
FirewallFirewall
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
Firewalls
FirewallsFirewalls
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
ezoicxcom
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
haq107457
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
MeymunaMohammed1
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
VivekTripathi684438
 
Computer network 6
Computer network 6Computer network 6
Computer network 6
MDHASNAIN23
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
saad504633
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
Radhika Talaviya
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Firewall
FirewallFirewall
Firewall
ArchanaMani2
 
Firewalls
FirewallsFirewalls

Similar to Fire walls (20)

Firewall
FirewallFirewall
Firewall
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewalls
FirewallsFirewalls
Firewalls
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
 
Computer network 6
Computer network 6Computer network 6
Computer network 6
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Fire walls

  • 2. Introduction  A firewall is a protective layer for your server that monitors and filters incoming and outgoing network traffic. It uses a set of rules to determine to allow or block specific network traffic.  Firewalls can prevent unauthorized use before reaching your servers.  Firewalls can be hardware or software based.
  • 3. Why need of Firewalls  To protect confidential information from those who do not explicitly need to access it.  To protect our network & its resources from malicious users & accidents that originate outside of our network.  A firewall keeps destructive and disruptive forces out, and controls the incoming and outgoing network traffic based on security parameters that you can control and refine.
  • 4. Types Of Firewalls A. Hardware Firewall  It is a physical device. More secure  It can be installed between the modem and computer.  It can be incorporated into a broadband router being used to share the internet connection.  E.g.- Cisco pix, netscreen, watchfuard etc.
  • 5. B. Software Firewall  It is a software application  It is installed onto the computer system that you wish to protect  Protect a single computer  This is usually the computer with modem attached to it.  E.g.- Norton internet security, MacAfee internet security etc.  Simple to install and upgrade  Takes up no physical space
  • 6. Access Control List (ACL)  An access control list (ACL) contains rules that grant or deny access to certain digital environments. There are two types of ACLs:  Filesystem ACLs━filter access to files and/or directories. Filesystem ACLs tell operating systems which users can access the system, and what privileges the users are allowed.  Networking ACLs━filter access to the network. Networking ACLs tell routers and switches which type of traffic can access the network, and which activity is allowed.  ACLs were the only way to achieve firewall protection  ACL Types – Standard and Extended ACL.
  • 7. Packet Filtering  Packet filtering is a firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols and ports  Packet filtering is fairly effective & transparent to users, but it is difficult to configure.  Packet-filtering firewalls operate at the network layer (Layer 3) of the OSI model. Packet-filtering firewalls make processing decisions based on network addresses, ports, or protocols.  Packet filtering checks source and destination IP addresses. If both IP addresses match, the packet is considered secure and verified
  • 8. DEMILITARIZED ZONE (DMZ)  A DMZ, short for demilitarized zone, also sometimes known as a perimeter network or a screened subnetwork is a network (physical or logical) used to connect hosts that provide an interface to an untrusted external network – usually the internet – while keeping the internal, private network – usually the corporate network – separated and isolated form the external network.  The DMZ is isolated using a security gateway (i.e. firewall) to filter traffic between the DMZ and the private network.  The ultimate goal of a DMZ is to allow access to resources from untrusted networks while keeping the private network secured.
  • 9. Alerts and Audit Trials  A firewall alert pop-up appears on your computer screen when the firewall detects suspicious network traffic on your computer.  Firewall Analyzer lets you to administer the triggered alerts, so that the network administrators take care of the triggered alerts and carry out remediation if required.  Audit trails are the manual or electronic records that chronologically catalog events or procedures to provide support documentation and history that is used to authenticate security and operational actions, or mitigate challenges  Audit trails can also identify areas of non-compliance by providing information for audit investigations.  Audit trail records will contain details that include date, time, and user information associated with the transaction