https://logz.io/blog/what-is-user-activity-monitoring/
This article discusses how User Activity Monitoring (UAM) can be used to thwart insider threats. The article discusses legal and ethical aspects of user activity monitoring and best practices.
https://learn.microsoft.com/en-us/power-platform/admin/manage-dataverse-auditing
The Dataverse auditing feature is designed to meet the external and internal auditing, compliance, security, and governance policies that are common to many enterprises. Dataverse auditing logs changes that are made to customer records in an environment with a Dataverse database. Dataverse auditing also logs user access through an app or through the SDK in an environment.
https://www.nist.gov/pml/time-and-frequency-division/time-services/nist-authenticated-ntp-service
This article speaks to NIST's NTP servers that support authentication.
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-92.pdf
This NIST Special Publication provides practical guidance on developing and maintaining effective log management practices.
Open Web Application Security Project (OWASP) – Logging Cheat Sheet OWASP
3.3 3.3.1 Audit and Accountability
https://cheatsheetseries.owasp.org/cheatsheets/Logging_Cheat_Sheet.html
This cheat sheet covers all of the important aspects of logging such as what to include and how long to retain among others.
proofpoint – The Importance of Enterprise Scale for User Activity Monitoring
3.3 3.3.2 Audit and Accountability
https://www.proofpoint.com/us/blog/insider-threat-management/importance-enterprise-scale-user-activity-monitoring
This blog discusses the biggest IT security threat facing companies today, their authorized users.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltd346db979178897d/5e9dfdd5dac81811514a1b08/information_logging_standard.pdf
This policy from SANS helps identify requirements that must be met by a system to generate logs.
https://www.cynet.com/incident-response/incident-response-sans-the-6-steps-in-depth/
SANS checklist for reviewing critical logs when responding to a security incident or for routine log review.
https://www.sans.org/white-papers/33528
This SANS whitepaper offers common elements to success for log management, in order to prepare for regulatory compliance audits.
https://support.solarwinds.com/SuccessCenter/s/article/Audit-Policies-and-Best-Practices-for-LEM?language=en_US
Best practices for Windows Auditing Log monitoring and different types of windows audit logs