Chapter 7

Logging and Auditing

Virtualization administrators need to ensure that logs are being generated by both virtual machines and the virtualization infrastructure components. This chapter will outline some best practices you can follow to make sure you're getting the right log information for troubleshooting and security, the logs are managed as effectively as possible, and logs are available for audit and security purposes when needed.

In this chapter you'll learn about the following topics:

  • Important logs for security and compliance on VMware, Microsoft, and Citrix infrastructures
  • Logging options for major virtualization components
  • What to look for in the logs you collect
  • Integrating virtualization logging into your existing log management ...

Get Virtualization Security: Protecting Virtualized Environments now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.