Web security planning

It is highly recommended that a security audit is made prior to deployment, and log files are written to several servers.

There are several applications that do this with no specific need for Sterling Selling and Fulfillment Foundation to duplicate their efforts. Additionally, products like Symantec's Intruder Alert monitor log files for authentication failures and alert an administrator if a threshold is exceeded.