The Graylog Blog
Planning Your Log Collection
Whether you are planning to use Graylog for security and threat hunting, IT Operations analysis and reporting, or any other use case, getting your logs into Graylog is essential. The process of log collection is sometimes a daunting task, especially if you are planning to collect massive amounts of data. But if you take a minute to answer some key questions before you begin, you can transform the log collection task from daunting to smooth sailing.
The Importance of Log Monitoring in Anomalous Behavior Analytics
What role does log monitoring have in intrusion detection and prevention and how does it work together with behavioral analytics?
Using Event Logs To Tighten Up Security
A huge volume of our personal and financial data depends on software code and databases. All of this information is stored in event logs, which is why having a dedicated log management tool is so important to IT security.
Cyber Security: Understanding the 5 Phases of Intrusion
Here at Graylog, we have recently had an increase in conversations with security teams from leading companies. We want to share our key findings with the Graylog community. In this blog post, we are going to review the 5 phases of intrusion and how to best combat attackers that are trying to infiltrate your networks and computer systems.
Aggregating, Managing and Centralizing Docker Container Logs With Graylog
Tools like Graylog are required for log management, aggregation, analysis, and monitoring in environments that make intensive use of Docker containers and Orchestration platforms.
How to Choose the Right Log Analysis Tool for Your Enterprise
Log management tools are a key element in any enterprise, but it’s hard to find the one that is responsive, scalable, and flexible enough for your specific ecosystem. Among the many log tools out there, how do you choose the right one for your business?
Server Log Files in a Nutshell
Where do server requests come from and why? You can find this information and more in server log files.
Strengthening cybersecurity with log forensic analysis
Forensic analysis is a highly reliable approache to enforce a strong cybersecurity posture, and can be made even more scientific when coupled with wise log management.
Cyber Security Mega Breaches: Best Practices & Log Management
Nick Carstensen of Graylog Outlines Lessons Learned from Recent Headline-Makers
Making data-driven decisions with log management software
Data-driven decisions certainly are more reliable than those based upon mere instinct, and logs are a fantastic source of information to fuel a company's business intelligence strategies.
Turning Unstructured Data Into Structured Data With Log Management Tools
What makes data structured or unstructured and how does that affect your logging efforts and information gain?
Improve Your Logging Efforts by Leveraging Your Search History
In this article, we will discuss some ways to get the best out of your saved searches and to speed up the search process.
Enhancing AWS security with Graylog centralized logging
Getting AWS logs into a SIEM or centralized log management platform such as Graylog is key to have proactive monitoring and alerting.
Improving IoT security with log management
We know we can strengthen IoT security with a wise log management strategy. But how can we leverage these event logs to improve the cybersecurity of these often extremely vulnerable access points to our systems?
Troubleshooting with Log Management - Best Practices
Troubleshooting is centered on first identifying and then rectifying problems within the system. Since logs record all kinds of event data, proper log management is a crucial step to figuring out exactly what went wrong - as well as when and how.
What Is Log Management? A Complete Logging Guide
In this log management guide, we will talk about the benefits of using log management tools to improve security, troubleshoot issues, and monitor your system as well as cover all the aspects of log collection.
Preventing and mitigating data loss with Graylog
Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a data loss or breach occur in your database.
Understanding Log Management: Issues and Challenges
Log messages – also known as event logs, audit records, and audit trails – are events as they pertain to computing. Let’s explore all the biggest log management challenges of modern IT, and the solutions for these problems.
Business Intelligence and Log management – Opportunities and challenges
Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog are the perfect solution to streamline data collection and analysis.
The importance of event correlation techniques in SIEM
Event correlation tools are a fundamental instrument in your security information and event management (SIEM) toolbox to detect threats from all sources in real time.
Threat Intelligence And Log Management: Security Through Automation
A well-integrated and fully-automated threat intelligence requires a proper centralized log management tool to attain a strong cybersecurity posture.
Audit Log: Feature Guide for Security and Compliance
Audit Log: Feature Guide for Security and Compliance
10 Things To Look For In an MSSP
There are several must-have capabilities to look for in a Managed Security Service Provider (MSSP), and these are 10 of the most essential ones.
What is IT Operations Analytics (ITOA)?
IT Operations Analytics (ITOA) is a vital asset to extract those valuable insights buried in piles of highly articulated data, and a powerful asset to sift through all the complexities of the Big Data.
ITOps vs. DevOps: What Is the Difference?
ITOps vs. DevOps: where does one end and the other begin? What does each role encompass and how can you tell the difference between them?
How Big Data and Log Management Work Hand in Hand
Become the master of Big Data with the right log management tools to help you quickly get your answers.
Reporting Up: Recommendations for Log Analysis
This post covers useful categories of information to monitor and report that indicate potential security issues.
3 Steps to Structuring Logs Effectively
Often, logs from different sources label data fields differently and/or provide data that’s completely unstructured. In order to analyze logs efficiently, they must be structured effectively.
What Are the Benefits of Monitoring Event Logs?
By monitoring event logs, you can gain deeper insight into system metrics, localize process bottlenecks, and detect security vulnerabilities.
How Can the Right Log Aggregator Help Your Enterprise?
The right log aggregation tools can go a long way towards maintaining and improving an existing system easily and efficiently.
The Log Viewer – Your Window into Log Management
An immeasurable amount of data, in raw, unfiltered form, exists all around us. For most of us, to be able to properly categorize and “read” that data, we first must convert it into a format that we can understand – which is where the log viewer comes in.
E-Commerce and Log Management
Learn how log management helps you review and analyze customer behavior and security issues on your e-commerce website.
Next-Level Threat Hunting: Shift Your SIEM from Reactive to Proactive
Shift your SIEM from reactive to proactive to start leveling up your threat hunting capabilities.
Log File Parsing
Learn the difference between structured and unstructured logs, the basics of the JSON log format, what kind of information you can get when you parse log files, and which tools and utilities to use to perform log file parsing.
Centralized Logging – Knowing When Less is More
Centralized logging is critical to get the most out of your logs, and filter for only the most useful and interesting data because sometimes less is just more.
Why Should You Bother With Information Technology Operations Analytics?
Your organization’s IT system is a complex network of intercommunicating devices that can provide you with an abundance of useful data - if you apply the right practices to gather and filter it. See how ITOA can help.
Meeting Compliance Regulations with SIEM and Logging
Health, financial, and educational organizations often have standards and regulations that must be followed. See how SIEM and logging can help you gain compliance.
How to Read Log Files on Windows, Mac, and Linux
This post focuses on log files created by the three main operating systems--Windows, Mac, and Linux, and the main ways to access and read log files for each OS.
Log Analysis and the Challenge of Processing Big Data
Modern enterprises generate an immense volume of data, and Big Data increases the complexity with its high variety and velocity. But a robust log management solution can help you filter out the useful information in that vast pool.
Selecting SIEM Tools - Questions to Consider
Does your organization really need a SIEM tool? Read on for questions to ask when selecting this essential solution for your environment.
Top Use Cases for Log Analysis
There is a wide scope of use cases for log analysis - from tackling security and performance issues head-on to enhancing the quality of your services. This post discusses these use cases in more detail.
Must-Have Features for Your Log Management Software
With so many choices available to us today, knowing what you need in your log management software can be difficult. Here are some tips on what features you should look for.
Selling Stakeholders on Automated Threat Response
With automated blocking, analysts can focus on higher value activities than responding to obvious security threats that can be safely handled with an automated response.
Do you need better insight into the overall state of your network security? Take a step back and look through the larger lens of the SIEM solution.
Why is Log Management Important?
Today, every important action that occur on our computers, mobile phones, and tablets is logged somewhere, so employing a proper log management solution is now more crucial than ever before.
Improving the Signal-to-Noise Ratio in Threat Detection
It’s unrealistic and cost-prohibitive for analysts to spot every threat. To avoid becoming a statistic, improve your threat intelligence signal-to-noise ratio to ensure real threats get the most attention.
Using Trend Analysis for Better Insights
A centralized repository of logs generated by your devices and applications stores a wealth of data. Trend analysis of that data gives you rich insight into activity in your environment.
The Power of Centralized Logging
Log files give you information about your IT environment. Having those logs centralized is essential to understanding your whole environment.
Talk to Us (Berlin Edition) - OSDC and Open Source Camp
Join us for OSDC and Open Source Camp in Berlin 12-14 June 2018!
The Value of Threat Intelligence Automation
The news is full of stories about the talent shortage in IT, especially in IT security. This shortage has created pressure on organizations to grow IT operations and to do that securely, all while having too few staff.
The Data Explosion and its Effect on Security
The shift to digital business is driving a massive expansion in the volume of data that organizations produce, use, and store. It is also accelerating the velocity of data—that is, the data is changing more rapidly than ever before.
Gameforge Uses Graylog to Stay Ahead of Application Performance Issues and Keep Gamers Happy
After reading some of our case studies, Lead Windows System Administrator at Gameforge, Felix Oechsler, felt inspired to share his story of Graylog’s evolution at Gameforge and got in touch with us last month.
How a Healthcare Provider Automates IT Operations Management
Ever wonder how others in the wild are using Graylog? We’ve got another featured Graylog user story for you!
How a Marketing Intelligence Company Uses Log Intelligence
One of the cool things about working here at Graylog is learning how Graylog is being used by the community. We recently spoke with Wiland, a U.S. company that’s been working with large data sets for a long time.