These are the things we’re going to cover. In essence, we’re going to cover a series of tools and how
they are logging the traffic they generate.
If you work within a Computer Incident Response Team or as an Intrusion Detection analyst, it is
very important to understand the logs you are working with. They are the key to solve the puzzle.