Web proxy log
Most of us now have a web proxy…now what??? • Centralize your logs • Modify your log format to suite your needs What do the “bad guys” look like??? • Different types of bad guys, overlap, difficult to tell apart Users Criminals / Entrepreneurs APT (Advanced Persistent Threat) How do we find “bad guys” on our networks???