Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Collecting and aggregating logs are very essential to any organization. There are many methods of collecting logs. Two methods are the push method (the target systems send the logs) and the pull method (where the logging device itself pulls the logs off target devices). This lab will deal with the most common method, pull method, used today in log aggregation, that is, ie. Syslog or RFC 5424. This lab will break this process up into a micro-step where logs will be aggregated in a virtual environment and then then verified that they are actually being received.
Subscribe to become an Insider Pro and get access to this app as well as: