Summary
In this chapter, we have discussed the value of web proxy logs, the information provided in the proxy logs, and the valuable fields of the proxy logs, such as log timestamp, source IP, source port, destination IP, destination port, response status code, username, user agent, device action, sent bytes, received bytes, referrer URL, accessed domain and URL, HTTP method, and website category.
In the next chapter, we will use the proxy logs explained in this chapter to investigate aspects of malicious web communication (C&C communication).