Why use Log management? Syslog and Windows Event logs
Log management-Prerequisites for ensuring network security
Logs give you first-hand information about network activity. Log management ensures that the hidden network activity data in the log is converted to meaningful actionable security information. Log management is the top priority that network security administrators need to complete to protect the network.
Log management includes collection, secure storage, normalization, analysis, generating reports, and alerting.
Log Collection
· Log collection must be non-invasive.
· You need to collect logs from different devices, servers, and application groups that appear on your network.
· It is a good idea to collect logs in an agentless manner. In some network environments, log collection in the form of proxies should be provided in an optional manner.
Secure storage
· Log data needs to be stored as an archive for forensic analysis and compliance requirements.
· Log data storage should be protected (for example, encryption)
· Also, the memory must be tamper-proof
· Retention duration should be flexible (preferably configurable by user)
· Storage locations should be flexible (read-only media, mass storage systems, and so on).
Log Normalization
Logs from a variety of different sources should be normalized using a common format. This is required for analysis and correlation.
Log analysis
Analyze logs for a comprehensive understanding of network security Events
Generate reports and alarms
The log is parsed to generate reports and alarms
· There should be pre-populated, customizable, customized, and scheduled reports in different formats and can be distributed.
· Alarms should be notified in real time. There should be more notification mechanisms and even other procedures to implement remedial measures
Log management is an integral part of monitoring network security
Why use Log management? -syslog and Windows Event logs