While some host-primarily based intrusion detection programs hope the log data files to be gathered and managed by a separate log server, Other individuals have their unique log file consolidators developed-in and in addition Get other data, for instance community targeted traffic packet captures.It supports a variety of log sources and may mechani