Chapter 5

Managing Event Logs

Introduction

Event logs provide valuable insight into what is happening on a system. The scope of a typical event log is very different from the output of an IDS (intrusion detection system). This is because in general the event logs are more tailored to specific systems and applications. With the right utilities you can even create event log entries for custom applications or batch files/scripts. For example, if you have a batch file that deleted old temp files on a server, you could have it send a log message to the syslog ...

Get Secure Your Network for Free now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.