Premium Content

Access "Firewall and system logs: Using log file analysis for defense"

Marcus Ranum Published: 01 Jun 2004

What do you do with your firewall and system logs? Typically, you collect them and back them up--and that's about it. But there are gold nuggets of useful info hidden in those logs that, ironically, many organizations ignore because they incorrectly believe the extraction tools are complicated and expensive. One of the great things about log analysis is that it's relatively easy to implement for a few dozen important servers. Sure, you can spend a lot of money on expensive systems and databases (and many organizations do), but all you need is a desktop PC, a few rudimentary scripts and some patience to get your feet wet. Think of it this way: How much money does your company spend on firewalls and IDSes? It's probably a lot, right? And yet they collect and analyze the information collected in--you guessed it--log files. There are gold nuggets in your discarded logs. Discarding or ignoring logs should be a crime. Think about all the useful intelligence you can draw from this well: Do you know how many of your corporate desktops are infected with spyware? Your... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free