home_banner `

Content Icon

Log Monitoring Checklist

November 16, 2018 | Tools & Templates | Security Information and Event Management (SIEM) and Log Management

This checklist presents the most common/important logs to review and what to focus on within the log data. 
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Tips for Choosing a New SIEM

Modern security information and event management systems (SIEMs) offer a variety of new features, capabilities and deployment options. In this Ask-an-Expert written response, IANS Faculty Mike Pinch explains the new trends and recommends some leading solutions to consider.

Know What and How to Monitor Within Office 365

Deciding among the multitude of monitoring and event collection options within Office 365 is difficult at best. In this Ask-an-Expert written response, IANS Faculty Mick Douglas details the most important events to monitor, and says which can be kept in the cloud and which should be pulled into your SIEM.

What to Look for in an IASM Tool

While many organizations consider intelligent application service monitoring (IASM) tools to be primarily operational in nature, they can also play an important role in security. In this Ask-an-Expert written response, IANS Faculty Jake Williams details the key features to assess across tools like AppDynamics, Dynatrace and New Relic.

Use Log Data to Monitor Application Access

What's the best way to build a standard for data logging within applications? In this Ask-an-Expert written response, IANS Faculty Marcus Ranum explains how it all comes down to creating well-documented taxonomies and parsable data structures.