The humble log file is something we sometimes “set and forget,” ignoring its critical role in effective security monitoring. Logs serve as the record of what all our fancy security software is doing and what it finds. Even if it were possible for you to observe and remember all the security events yourself, that knowledge would be lost if you were gone – whether permanently or temporarily. How to configure logging is an important decision that you have to make based on your network’s needs, your budget and resources. This article provides some key points for you to think about when you’re setting up a new logging system or evaluating your current one:
About The Author
Deb Shinder
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.
Read Next
Netwrix Releases First Ever Hybrid Cloud Visibility Solution
Netwrix Auditor 8.0 enables security threat prevention and increases visibility into data stored both on-premises and in the cloud
How does Windows 10 intrude your privacy?
SoftOrbits is reporting on ways to stop Windows 10 spying on users.
Microsoft might add public-key pinning technology
Public key pinning can help to protect against man-in-the-middle attacks and according to recent reports, Microsoft is considering adding it to IE
Most Devs don’t use a Security Process
According to a study conducted by ComScore and referenced by Microsoft's head of Trustworthy Computing, fewer than half of developers are using a security development…