University of California Berkley Information Security Office - Security Audit Logging Guideline
This guideline describes the risk of inadequate logging, defines events to be logged and establishes a case for using an automated tool for log review.
This guideline describes the risk of inadequate logging, defines events to be logged and establishes a case for using an automated tool for log review.