I seek advice on securing and monitoring Remote Monitoring and Management (RMM) services like Kaseya. I had a n experience with an account take over, and the actors used RMM to deploy malware to target systems. The logs only show connection details and no tracking of downlods, patches or updates. Any ideas how to track and log this activity?
You can implement intrusion detection and prevention systems (IDPS) to monitor network traffic and identify any suspicious or unauthorized activities. IDPS can provide valuable insights into potential security breaches. My Envoy Air