O'Reilly logo

Secure Your Network for Free by Eric Seagren

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Managing Event Logs

Introduction

Event logs provide valuable insight into what is happening on a system. The scope of a typical event log is very different from the output of an IDS (intrusion detection system). This is because in general the event logs are more tailored to specific systems and applications. With the right utilities you can even create event log entries for custom applications or batch files/scripts. For example, if you have a batch file that deleted old temp files on a server, you could have it send a log message to the syslog ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required