Summary
In this chapter, you learned about the importance of data correlation while reviewing logs in different locations. You also read about relevant security-related logs in Windows and Linux.
Next, you learned how to read firewall logs using Check Point, NetScreen, iptables, and Windows Firewall as examples. You also learned about web server logs, using IIS and Apache as examples. You concluded this chapter by learning more about AWS Cloud Trail logs, and how they can be visualized using AWS Dashboard, or Azure Sentinel. You also learned about Azure Activity Log and how to visualize this data using Azure Portal and Azure Sentinel. As you finish reading this chapter, also keep in mind that many times it is not about quantity, but about quality. When the subject is log analysis, this is extremely important. Make sure that you have tools that are able to intelligently ingest and process the data, and when you need to perform manual investigation, you only focus on what it has already...