The foundation of good security monitoring

The humble log file is something we sometimes “set and forget,” ignoring its critical role in effective security monitoring. Logs serve as the record of what all our fancy security software is doing and what it finds. Even if it were possible for you to observe and remember all the security events yourself, that knowledge would be lost if you were gone – whether permanently or temporarily. How to configure logging is an important decision that you have to make based on your network’s needs, your budget and resources. This article provides some key points for you to think about when you’re setting up a new logging system or evaluating your current one:

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top