You are looking to start log collection within your network. You need a solution that can be installed on a myriad of different operating systems and collect logs from a wide variety of sources. Which logging tool should you implement?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |