Chapter 7

Logging and Auditing

Virtualization administrators need to ensure that logs are being generated by both virtual machines and the virtualization infrastructure components. This chapter will outline some best practices you can follow to make sure you're getting the right log information for troubleshooting and security, the logs are managed as effectively as possible, and logs are available for audit and security purposes when needed.

In this chapter you'll learn about the following topics:

  • Important logs for security and compliance on VMware, Microsoft, and Citrix infrastructures
  • Logging options for major virtualization components
  • What to look for in the logs you collect
  • Integrating virtualization logging into your existing log management ...

Get Virtualization Security: Protecting Virtualized Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.