Summary
In this chapter, we covered the very important and highly ignored topic of reading and analyzing log files, and the tools to deal with them. You learned the need to rotate and collect your log files for offline analysis and that they are a great way to see a "trend" that may be a precursor to an attack. Just remember to monitor AND backup your logs frequently.