A good security solution has many layers or components, commonly referred to as 'Defense in Depth'. Regardless of which types of security solutions are being implemented, logging is critical to ensure their implementation is running smoothly as well to keep tabs on what is happening in an...