The extended use of log files part 2
Posted in Compliance, Security Architecture on Sep 30th, 2010
Log files are mainly used for investigative reasons but there is a secondary usage of logging and that is performance analysis. Just recently I helped a hospitals surgery to pinpoint where they could be more effective by importing the log files into an analysis tool, using user identity to identify who did what and then […]