Monitoring

Most of the critical issues stem from lack of monitoring, could be a ransomware/Vi rus at tack/ HW failure/Data corruption/Backup failure etc., The following are our A-Z list that require monitoring, that could prevent or stop any of these from happening well in advance.
User creation.
Group Addition.
Privilege change.
Password reset.
Account deletion.
Local account changes.
Login failures.
File access.
Network bandwidth monitoring.
Storage usage.
RAM Usage.
CPU Usage.
VM creation.
Malware detection.
Mandatory patching.
Internet entry point.
Vulnerability monitoring.
Behavioural monitoring.
Inventory monitoring (application inventory).
Compliance monitoring.
Log monitoring.
Performance monitoring.
Critical application/appliance health monitoring.
Backup monitoring.
DR/BCP status monitoring.
Capacity monitoring.
monitor-img