Security.com

access log

By Andrew Zola

What is an access log?

An access log is a list of all requests for individual files -- such as Hypertext Markup Language files, their embedded graphic images and other associated files that get transmitted -- that people or bots have made from a website. Internet-based users make digital footprints in the form of web usage data that is recorded in access logs on web servers. These server logs record the history of page requests made to the server and other pertinent information.

Sometimes referred to as the raw data, the access log can be analyzed and summarized by other programs. Raw log files might also be referred to as audit records, audit trails, audit logs or Event logs.

Access log analyses can provide the following information:

Why are access logs important?

Access logs are a valuable business tool because they provide an overview of web traffic, and data from these logs provide insight into how end users interact with web properties. Understanding when users come to a site and where on that site they go is valuable to getting a handle on customer needs. In marketing, for example, data from access logs provides insight into user behavior and helps companies use their websites and address customer needs more efficiently.

As with all types of computer logs, using access logs for monitoring helps pinpoint where errors occurred and what strategies are working -- or not. In addition to monitoring web use over time, access logs show which files were accessed recently, how a company responded to a web request and if there were any unusual requests or anomalies that might suggest a flaw or security vulnerability.

Types of access logs

Different types of access logs collect different types of data. Access logs providing security control include antivirus, firewall and web filter logs:

Organizations developing a log strategy should not overlook web server logs; although these logs are common, they provide valuable business insight. Access log keepers and analyzers can be found as Shareware on the web or may come with a web server.

Examples include the following:

Related terms

Related terminology to access logs includes logical access and logical access control. In IT, logical access describes the process of remotely accessing hardware and interacting with it. Logical access often features authentication protocols, Authorization protocols and identification protocols. In contrast, physical access describes the act of physically interacting with hardware in the environment where it is stored -- for example, a server room or data center.

After establishing the user's identity, logical access controls enable or prevent access to available resources. Once logged in, authorized users have access only to resources that have been already assigned and deemed necessary for them to perform their duties.

See how log analytics tools have gained application performance support skills and log analytics use cases set better ops in motion. Also, gain deeper IT insight with machine learning for log analysis, and consider the pros and cons of AI-based log analysis tools.

04 Jan 2022

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement