Log Management

A security service that gathers digital records and offers analysis and insights for auditing, solving IT problems, and enhancing information security. 

  • Special tools to spot patterns in security data and find important information that’s often missed
  • 24/7 access for advanced users
  • Quick alerts and reports that won’t disrupt your work
  • Automatic log sending and custom log requests and advice when you need it
  • University-owned, managed, or affiliated systems are eligible. The service can be requested by anyone who is an application or system owner or has a need to know

Learn more about Security Policy and Compliance in the ITS Knowledge Base

Log management is provided at no cost

  • System owners are required to verify their ownership
  • Systems with Protection Level 3 (P3) and Protection Level 4 (P4) information are required to align with Critical Security Controls (CSC) and the IS-3 Electronic Information Security Policy.  For other applications and systems, it is recommended to align with these controls and policies
  • Subscribing to the Log Management service, getting privileged account alerts/reports, and following these recommendations will align you with the noted controls and policies. If you choose not to subscribe, you’ll need to find your own way to follow the noted controls and policies

Search the knowledge base, browse IT guides, and open a support request.

Last modified: Apr 28, 2025