Log Analysis Final Part 3 1703257926
Log Analysis Final Part 3 1703257926
Log Analysis Final Part 3 1703257926
ANALYSIS
( PART 3)
“Log analysis is the process
of interpreting & reviewing
computer-generated event
logs to proactively identify
bugs, security threats or
other risks.”
Log analysis is typically done within a Log
Management System, a software solution
that gathers, sorts and stores log data and
event logs from a variety of sources.
e.g: ELK Stack (Elasticsearch, Logstash,
Kibana), Splunk, Graylog.
Real-time collection
Lightweight
Suitable for remote or disconnected
systems
Requires installation on each system
Potential resource consumption
SYSLOG
A standard protocol for forwarding log
messages within an IP network.
Standardized
Supports UDP and TCP
Widely used in UNIX-based systems
Limited security features in the
original syslog protocol.
LOG FORWARDERS
Specialized tools that collect logs from
various sources and forward them to
centralized log management systems.
Scalability
Powerful search and analysis
capabilities
Visualization tools
Cost (some solutions may be expensive)
Resource-intensive
WINDOWS EVENT
FORWARDING
Windows-specific mechanism for
collecting and forwarding event logs.