From the course: Network Forensics
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Network logs
- [Speaker] A computer network consists of various devices, each of which produces log files of it's own. They logged events that require human attention in various files. Hardware and software errors, as well as intrusion attempts, are examples. The hardware components include personal computers, or PCs, servers, routers, and firewalls. Most refer to any piece of hardware in a network which has a unique address such as media access control, or MAC, an internet protocol, or IP addresses. PCs are abundant sources of network logs. They generate the records of users' network activities which contain the details on the websites they visit, and the remote servers they access. Servers are also hosts but different from PCs because they specialize in providing certain services, for example, web servers which serve content to browsers. Web server log files document when a host accesses a specific website. If a web server encounters an error while processing a request, they also capture the…
Contents
-
-
-
-
-
(Locked)
Network logs3m 6s
-
(Locked)
Intrusion and security events5m 2s
-
(Locked)
Network logs as evidence3m 16s
-
(Locked)
Network logs and compliance3m 12s
-
(Locked)
Audit logs3m 28s
-
(Locked)
Firewall logs4m 23s
-
(Locked)
syslog6m 14s
-
(Locked)
syslog-ng6m 31s
-
(Locked)
Kiwi Syslog Server2m 39s
-
(Locked)
Microsoft Log Parser4m 34s
-
(Locked)
-
-
-