Last updated at Tue, 31 Oct 2017 13:47:31 GMT

One of the more unique customer use cases we’ve seen recently is allowing the security incident response team to use log data to track malicious attempts against their network.  It is well established that Logentries can maintain log data across all of your systems – but adding just a few more pieces of information can result in deep insights into your security measures and their effectiveness.Logs as Data for Security

So how do you do this today? Most current generation firewalls and routers support syslog capabilities and can be sent to Logentries for analysis.   By adding in logs from Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS) and vulnerability scanners, you can achieve a complete “beginning to end” view of an access attempt.

With the new grouping feature, you can easily group your edge router, firewall, internal routers, IDS/IPS, vulnerability scanner, and access, system, and error logs from the physical machines into one centralized location.  With just a few clicks you can easily be set-up to monitor these security logs in real-time and to trace a connection through your entire network to determine which security measures succeeded or failed. This gives you immediate visibility into if — and *how — *the network was exploited.

Have questions? Feel free to contact our Support team at!Using Logentries to identify security issues