← Back to Glossary
Log Analysis
The examination of system, application, and security logs to identify suspicious activities, reconstruct events, and support incident investigation.
The examination of system, application, and security logs to identify suspicious activities, reconstruct events, and support incident investigation.