In this video, I demonstrate how to quickly filter important security logs to look for when auditing a system from a security perspective. Depending on your organization, you may want automate the process by using many SIEM tools. References: JSIG_2016April11_Final_(53Rev4) NIST SP 800-92 (Guide to Computer Security Log Management) Disclaimer - Opinions expressed are solely my own and do not express the views or opinions of my employer.











