Abstract :
Modern enterprises centrally monitor their systems by collecting logs using audit reduction tools that can search, sort, and alert. The author describes how developers can support such monitoring by writing logging mechanisms that account for the strengths and weaknesses of audit reduction tools.
Keywords :
auditing; system monitoring; audit logging; audit reduction tools; developer guide; enterprise system monitoring; logging mechanisms; Computer security; IP networks; NIST; Virtual private networks; Blue Coat ProxySG; SIEM; audit log; audit logging; audit reduction; event code; security; security information and event management system; security operations center;