Advanced Log Processing

Friday, 2 August 2002, 10:46 AM EST

One of Murphy's laws advises to "only look for those problems that you know how to solve." In security, this means to only monitor for those attacks that you plan to respond to. It is well known that any intrusion detection system is only as good as the analyst watching its output. Thus, having nobody watching the IDS is equivalent to having no IDS at all. But what should an IDS administrator do if he or she is drowning in a flood of alerts, logs, messages and other attention grabbers?

Logs serve to assure that everything is working as it should be, and to help figure out what malfunctions or security incidents may have occurred. Having logs from multiple machines collected in one place simplifies both day-to-day maintenance and incident response. The advantages of a centralized log collection site include more effective auditing, secure storage of logs, and the increased opportunity for analysis across multiple platforms. In addition, secure and uniform log storage might be helpful in case a intruder is prosecuted based on log evidence, in which case, careful documentation of log handling procedure might be needed.

[ Read more ]




Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //