EASE THE BURDEN FOR SYSTEM ADMINISTRATORS!
Operating systems, applications, and network devices generate text messages of the events that happen to them: a user logs in, a file is created, a network connection is opened to a remote host. These messages, called log messages, can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations.
From this White Paper you can learn:
- What system logging is and how it helps ease the burden for system administrators
- How artificial ignorance detects anomalies in a working system
- What you need to do to exploit the advanced log message classification method of syslog-ng