One relatively simple and common tool that provides additional valuable analysis into security incidents is log management.
Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This, your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management.
Log data can be a tremendous resource for protecting digital assets against cyber attacks. Trouble is, trying to make sense of all the logs generated by IT networks is like pointing a fire hose at someone dying of thirst. They’re desperate for a drink, but they simply can’t handle that much water all at once!
When an operating system crashes, a server stops responding to ping, or a simple PowerShell DSC configuration needs to be debugged, where's the first place a sysadmin goes? The event log. The Windows event log records a wealth of information. Let's see how we can automate log reviews.
How much time have you spent on Windows log management and analysis lately? Not much? No time for it? Allow me to help. Log management and analysis doesn’t take as much time as you think, and you can solve network problems and boost security and compliance while you're at it.
Get our latest blog posts delivered in a weekly email.