Internet
Fact-checked

At WiseGEEK, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What Is a Security Log?

Mary McMahon
Mary McMahon
Mary McMahon
Mary McMahon

A security log maintains continuously updated records on security-related events in a computer system or network. Whenever an event that fits within the parameters occurs, the log generates a new entry. Such programs can track operating system events, applications, and network activity. The information is available for review and may network with a management system to make it easier to locate events of concern and identify specific issues within the log. Raw files are also available for technicians to review by hand.

Some examples of entries in a security log might include program updates, changes in permissions, and suspected intrusions. The security log runs continuously to compile information for the benefit of the operator. In the event of a problem, it can be audited to learn more about the nature of the situation and how the computer responded. For example, a technician might note that a firewall blocked an attack while allowing another through. This indicates that a modification may be necessary to prevent similar intrusions in the future.

Woman doing a handstand with a computer
Woman doing a handstand with a computer

The compiled data may be stored for varying lengths of time. Maintaining a security log that dates back to when the system was first booted up would result in a massive file. Thus, the system periodically purges its logs to remove old data. A technician can determine the most appropriate storage time, balancing the need to conserve memory with the potential desire to be able to look through older records to identify patterns.

One issue with security logs is their sheer size, even with regular removal of old records. Manually going through a log can be functionally impossible on a complex computer or network because of the large number of entries. Not looking at the document, however, defeats the purpose, and may mean that technicians miss important events. A server, for example, could have a trail of events in the log leading up to an attack. If those had been spotted, a hacking might have been prevented.

Management of security logs may involve the use of a program that scans the log. The program can look for keyphrases or specific types of events and generate a report for the operator. Some can trigger automatic warnings; servers, for example, may call an emergency phone number when signs of an immediate threat appear in the security log. This becomes part of the layered security for the system to minimize the risks of downtime and data loss.

Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a WiseGEEK researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Learn more...
Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a WiseGEEK researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Learn more...

Discussion Comments

SZapper

One of my friends from high school worked at an electronics shop repairing computers. So I got all my computer repairs done for free!

Once when he was getting rid of some viruses that had infected my computer, he showed me the security log. It was long, with tons of entries. I don't think I would have the patience to sit and go through something like that.

I suppose it would be a good record to have in a court case for something like computer hacking though. But I sure don't envy the person whose job it is to go through those things!

Post your comments
Login:
Forgot password?
Register:
    • Woman doing a handstand with a computer
      Woman doing a handstand with a computer