Sponsored Links
-->

Tuesday, January 9, 2018

Security Log Book #1105 | Log Books Unlimited®: Your Online ...
src: cdn.shopify.com

A security log is used to track security-related information on a computer system. Examples include:

  • Windows Security Log
  • Internet Connection Firewall security log

According to Stefan Axelsson, "Most UNIX installations do not run any form of security logging software, mainly because the security logging facilities are expensive in terms of disk storage, processing time, and the cost associated with analyzing the audit trail, either manually or by special software."


Video Security log



See also

  • Audit trail
  • Server log
  • Log management and intelligence
  • Web log analysis software
  • Web counter
  • Data logging
  • Common Log Format
  • Syslog

Maps Security log



References

Source of article : Wikipedia