• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

Importance of Log File in Network Security

AnonyViet by AnonyViet
January 12, 2023
in Network
0

Logs, in essence, are files that record specific events, when they occurred, where they occurred and other information related to the incident, depending on the parameters configured. . These are very important when it comes to security and troubleshooting – whether we look at logs to determine the root cause of problems or see if processes are working properly, logs notify us of events occurring in the system and play an important role in providing us with information.

Join the channel Telegram of the AnonyViet 👉 Link 👈
Importance of Log File in Network Security 8
Logs are located in /var/log/syslog

Log format

Logs can be in many different formats. If your diary comes from Windows Event Vieweryou can use the .csv, .XML, .evtx and .txt extensions when saving them.

Why should we care about Log in cybersecurity?

On the other hand, if you are using a Linux system, the log will usually have the .log extension.

Importance of Log File in Network Security 9

Where can I find the diary?

In a Windows environment, event logs will usually be stored in the C:\Windows\system32\config. Note that to modify, view or edit log files, you will need elevated privileges.

Importance of Log File in Network Security 10

For the Access Log in IIS, the default can be found at the path: %SystemDrive%\inetpub\logs\LogFiles

In a Linux environment, the log will usually be stored in the path /var/log. Depending on the log file, you will need the appropriate permissions to read or modify it.

Importance of Log File in Network Security 11

For the Access Log in Apache, Nginx or other Webservers you can find it in the service’s config.

When to log?

In an enterprise environment, almost all devices in the network can be logged. From workstations, endpoints, routers, switches, firewalls, and proxy until IoT, logging can be a very effective tool to understand exactly what is happening in these systems. However, it is important to keep a quality log.

Logging events unrelated to your goals can cause informational noise, which often has more disadvantages than benefits. You certainly don’t want to go through lots of unrelated information files just to find something useful to you. It also consumes a lot of storage space.

The goal should always be to log critical events that indicate whether processes are working as expected, unusual traffic, etc.

How much disk space is used when logging?

Depending on the organization and the devices used, the number of EPS (Events Per Second) may vary. For example, on average, a Windows Workstation might have an EPS of 1.0, representing one event per second, while a firewall might have an EPS of 10.0–50.0, representing 10–50 events every second.

However, you also need to consider peak traffic times, as these are often times when a lot of unusual things happen. To calculate how much space is needed on a given day, you can use the following equations:

EPS (per device) * 86,400 (seconds in a day) * 600 (size of an average raw event, in bytes) = size of the uncompressed log file in bytes for a given day, and a single device considers those events stored in their raw form.

EPS (per device) * 86,400 (seconds in a day) * 1500 (size of a single event normalized on average, in bytes) = size of the uncompressed log file in bytes for a single event certain date and for a single device consider those events stored in its normalized form.

So what is the difference between raw event and normalized event?

In essence, a normalized event is a modified version of the raw event. The content of the raw event is rearranged and additional information is added to make the event easier to read and understand for security administrators. This is a very important step to ensure that the logs are providing the information needed to properly secure the system. However, the normalized events are heavier than the raw ones.

Compression

Storing these log files in an uncompressed form can take up a lot of storage space. Therefore, we must use compression to reduce storage space. An 8:1 ratio can be a good starting point, but it is important to take into account variables such as the impact on the SIEM system, the amount of normalized versus raw data, and so on.

Importance of Log File in Cybersecurity 12
Compressed folder size
Importance of Log File in Network Security 13
Uncompressed folder size

Conclusion

Logs are an important element of Cybersecurity. When implemented properly, logging can give us a clear view of what is happening or has happened in our system, allowing us to attest to events with great accuracy. higher accuracy and make adjustments as needed.

Understanding where and what to record is important if we want to extract valuable data from this process. Logging can be costly in storage space, so it’s important to consider various factors (EPS, NE (Normal Event), PE (Peak Event), normalized events and raw, compression speed, number of devices, potential free space, etc.) when allocating storage space resources to write files.

The article achieved: 5/5 – (100 votes)

Tags: fileImportanceLognetworksecurity
Previous Post

What is MOTM? What is Man of the Match?

Next Post

How to make money with “Professional Mode” on Facebook

AnonyViet

AnonyViet

Related Posts

Guide to self -creation socket5 on Ubuntu
Network

Guide to self -creation socket5 on Ubuntu

May 28, 2025
How to create a separate mtproto proxy to use Telegram when blocked
Network

How to create a separate mtproto proxy to use Telegram when blocked

May 25, 2025
Script backup database and website on telegram
Network

Script backup database and website on telegram

May 2, 2025
Create 64GB RAM 16 core for free on Google IDX
Network

Create 64GB RAM 16 core for free on Google IDX

April 13, 2025
What is VPS running Vietnamese software? What is the reason for installing Vietnamese software on VPS?
Network

What is VPS running Vietnamese software? What is the reason for installing Vietnamese software on VPS?

February 17, 2025
Create Ronin wallet to play pixels on VPS Windows
Network

Create Ronin wallet to play pixels on VPS Windows

February 17, 2025
Next Post
How to make money with “Professional Mode” on Facebook

How to make money with "Professional Mode" on Facebook

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
[Godot Shooter] #2: Creating characters & shooting bullets

[Godot Shooter] #2: Creating characters & shooting bullets

June 7, 2025
Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply