This chapter explores log records on a local machine and from a centralized repository. This section is useful to home techies, security analysts, and technicians working in corporate environments that might ingest and store log sources from multiple devices for correlation. Now might be a good time to start if you work in a corporate environment and aren’t storing log records. Tell your boss you have a great idea that pays huge dividends when an incident occurs. First, let’s discuss local logs that are stored natively on ...
7. Log Searching and Response
Get How to Catch a Phish: A Practical Guide to Detecting Phishing Emails now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.