training placeholder image
  All Service Staff
  Service related
 15  minutes

Brief Description

  • Get an overview about security-related aspects of using KFS like utilized ports and protocols. Develop some awareness of which kind of data is transferred and how events in the system can be monitored with the audit logs.

Target Group

  • Service Technician, Sales Representative

Theoretical and practical contents

  • Access to KFS
  • Audit logs
  • Using network protocols and ports
  • Transferred data
  • Security certification

After this training you will be able to…

  • identify the differences between monitoring and management mode
  • recognize the logs within KFS and their scope
  • put the utilized protocols and ports into context
  • evaluate the type and size of data transferred by KFS
  • see the advantages of complying to security certifications