This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.
Action Required!
Please select your Toolkit.

STEP 9

Log and Monitor

Use the tools in this toolbox to log and monitor activity on your network, so that you can track security status and identify issues.

Lastly, it’s important to remember that security cannot be a “one and done” approach. You have to continuously monitor what’s going on within your environment. Collecting, managing and analyzing data logs are important ways to identify normal vs. anomalous activity and can help you detect, understand and recover from an attack. Use these tools to automate this process.

9.1 Collect and Manage Logs

Narrow your search by selecting your OS
Type
3
Level
1h 0min
Time

Graylog

Use this tool to collect and analyze log data.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.