|
Throughout this chapter, you learned of the many valuable roles that network file log analysis plays in a strong perimeter defense. By automating most of the log analysis and reviewing the reports generated by the automation, you can quickly gain insight into activity on your network and respond much more quickly to events that have just occurred or are in progress. Network log analysis can be of great assistance in such diverse areas as intrusion detection, incident handling, and problem troubleshooting. With an initial investment of time to familiarize yourself with typical log entries and to establish log analysis automation, you can make network log analysis an integral part of your perimeter defenses. |
|