O'Reilly logo

Virtualization Security: Protecting Virtualized Environments by Dave Shackleford

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Logging and Auditing

Virtualization administrators need to ensure that logs are being generated by both virtual machines and the virtualization infrastructure components. This chapter will outline some best practices you can follow to make sure you're getting the right log information for troubleshooting and security, the logs are managed as effectively as possible, and logs are available for audit and security purposes when needed.

In this chapter you'll learn about the following topics:

  • Important logs for security and compliance on VMware, Microsoft, and Citrix infrastructures
  • Logging options for major virtualization components
  • What to look for in the logs you collect
  • Integrating virtualization logging into your existing log management ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required