© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
N. OlesHow to Catch a Phishhttps://doi.org/10.1007/978-1-4842-9361-4_7

7. Log Searching and Response

Nicholas Oles1  
(1)
Severn, MD, USA
 

This chapter explores log records on a local machine and from a centralized repository. This section is useful to home techies, security analysts, and technicians working in corporate environments that might ingest and store log sources from multiple devices for correlation. Now might be a good time to start if you work in a corporate environment and aren’t storing log records. Tell your boss you have a great idea that pays huge dividends when an incident occurs. First, let’s discuss local logs that are stored natively on ...

Get How to Catch a Phish: A Practical Guide to Detecting Phishing Emails now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.