ELI5: What is Log Management?

Every time someone walks through a door in a building, a security camera records it. Logs are like those recordings, but for computers — they write down who did what and when. Log management means collecting all those recordings from every door in every building, putting them in one place, and keeping them organized so that if something goes wrong, you can rewind and figure out exactly what happened.

Overview

Log management is the practice of collecting, centralizing, storing, and analyzing log data generated by operating systems, applications, network devices, and security tools. Proper log management is essential for incident detection, forensic investigation, compliance, and operational troubleshooting. Without centralized logging, security events across the environment remain fragmented and difficult to correlate.

Key Concepts

  • Log sources: OS event logs, firewall logs, IDS/IPS alerts, authentication logs, application logs, DNS query logs, proxy logs
  • Syslog: Standard protocol (UDP 514, TCP 514, or TLS 6514) for transmitting log data to a centralized server
  • Centralized logging: Aggregating logs from all sources into a single repository for unified analysis
  • Log forwarding agents: Software installed on endpoints to collect and send logs to central systems
  • NTP synchronization: All systems must use the same time source — accurate timestamps are critical for event correlation
  • Log retention policies: Defining how long logs are stored based on regulatory and organizational requirements
  • Log integrity: Protecting logs from tampering using write-once storage, hashing, or digital signatures
  • Windows Event Log: Security, System, and Application logs; Event IDs like 4625 (failed login) and 4624 (successful login)
  • journald: Linux systemd journal for structured logging
  • rsyslog: Enhanced syslog daemon with TCP support, filtering, and database output
  • syslog-ng: Advanced syslog with content-based filtering, flexible configuration, and TLS encryption
  • journalctl: Queries systemd journal; filters by unit, priority, or time range

Exam Tips

Remember

Time synchronization (NTP) is CRITICAL — without consistent timestamps, you cannot correlate events across systems. Key Windows Event IDs: 4624 = logon success, 4625 = logon failure, 4648 = explicit credential use.

  • Logs should be stored on a separate, secured system — attackers often wipe local logs
  • Regulatory requirements (HIPAA, PCI-DSS, SOX) dictate minimum retention periods
  • Ensure logs cannot be modified — integrity is essential for forensic and legal use

Connections

  • Primary data source for siem platforms to perform correlation and alerting
  • Essential evidence source for digital-forensics investigations and timeline reconstruction
  • incident-response depends on complete and accurate logs for detection and analysis phases
  • Supports compliance by providing audit trails required by regulations

Practice Questions

Scenario

See case-log-management for a practical DevOps scenario applying these concepts.