HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.132 Monitoring of a Lotus Notes system

S 4.132 Monitoring of a Lotus Notes system

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator, Auditor

In order that the security of a Notes system can be maintained during ongoing operations, it is essential to monitor the system. Only in this way can possible configuration errors, security loopholes, security breaches by users and attacks on the system come to light.

Monitoring of the system generally entails the collection of user-related data. Otherwise it is not possible to establish in the event of a security breach which user was responsible. The Data Privacy Officer and the staff council and works council must therefore be involved in planning the monitoring concept as early as possible.

In particular, Lotus Notes' IT security features do not yet include any systematic auditing mechanism, but instead system activities are captured in several log files. However, it is possible to arrange an automatic response to the occurrence of various system events.

At this point it is not possible to make any general recommendations regarding the logging settings, as the type and scope of information that needs to be logged will depend strongly on the particular operational scenario concerned and the monitoring concept used.

With regard to the monitoring of a Notes system, the following factors should be considered:

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home