General discussion


Security Solutions: Readable log files

By discussion ·
Security logs are the information backbone of security administration. In this week's Security Solutions TechMail column, Mike Mullins provides four rules for security logging. What additional best practices do you suggest? Do you have a tool that you use to decipher and correlate log files with specific security devices?

If you're interested in the Security Solutions TechMail, but would like to learn more about it before signing up, point to this link and then click Security Solutionsto see a sample:

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

Find Log Sage

by discussion In reply to Security Solutions: Reada ...

If you're interested in further information about Log Sage, here's the link to their Web site:

(Before pasting this link into your browser, first remove any spaces.)

Collapse -

Thanks for the URL

by Robert.K In reply to Find Log Sage

I struggle on a weekly basis with Symantec firewall logs. So, I was very excited about a better way to analyze these logs. I spent several minutes searching the web before checking the discussion forum for a URL for Log Sage.

Related Discussions

Related Forums