You should have offsite logging that attacker cannot wipe in case of compromise of this machine

Reply to this note

Please Login to reply.

Discussion

No replies yet.