Download presentation
Presentation is loading. Please wait.
Published byBlaise Brown Modified over 9 years ago
1
Logging
2
What is a log?
3
What gets logged?
4
Logins / logouts Privilege escalation Security relevant events
5
What goes in a log?
6
Why keep logs?
7
Why look at logs? (Marcus) Policy Legality Cost saving
8
Common mistakes (Marcus) #1 – collecting it and not looking atit (might as well log to /dev/null) #2 – watching logs from perimeter systems while ignoring internal systems #3 – Designing your log architecture before you decide what you ’ re going to collect #4 – Only looking for what you know you want to find instead of just looking to see what you find.
9
Common Mistakes 2: #5 – Proceeding without doing envelope estimates with of load. #6 – thinking your logs are evidence if you don ’ t collect them right #7 – forgetting that this is just a data management problem #8 – Drinking the XML Kool-ade
10
How are things logged? f = fopen(“logfile”,”w+”) syslog() Logger
11
Web Logs
12
Mail Logs
13
Radius Logs
14
Melissa
15
Log architectures UDP log issues Windows
16
Logging on Unix /etc/syslog.conf /etc/newsyslog.conf Grep swatch
17
Logging on Windows: Event Viewer Local security settings
18
Log hosts & Aggregation
19
Federal Rules of Evidence
20
What is Hearsay?
21
Can you trust these logs?
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.