A security log is used to track security-related information on a computer system. Examples include:
According to Stefan Axelsson, "Most UNIX installations do not run any form of security logging software, mainly because the security logging facilities are expensive in terms of disk storage, processing time, and the cost associated with analyzing the audit trail, either manually or by special software."
- Audit trail
- Server log
- Log management and intelligence
- Web log analysis software
- Web counter
- Data logging
- Common Log Format
- Stefan Axelsson, An Approach to UNIX Security Logging.
|This operating system–related article is a stub. You can help Wikipedia by expanding it.|