{"id":14151,"date":"2015-10-28T11:01:55","date_gmt":"2015-10-28T10:01:55","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=739"},"modified":"2023-03-14T08:57:31","modified_gmt":"2023-03-14T07:57:31","slug":"log-infrastruktur","status":null,"type":"post","link":"https:\/\/news.save.ch\/de\/log-infrastruktur\/","title":{"rendered":"LOG-Infrastruktur"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-740 size-full\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/LOG-Infrastruktur-it-security.jpg\" width=\"499\" height=\"329\" \/><\/p>\n<p>F\u00fcr den Aufbau einer Log-Infrastruktur steht eine kaum \u00fcberschaubare Auswahl an Produkten zur Verf\u00fcgung. Sie alle k\u00f6nnen aber nur die in Logs enthaltenen Daten auswerten und darstellen. Grund genug, einen Schritt zur\u00fcckzugehen und sich Gedanken zu machen, was geloggt werden soll.<\/p>\n<p>In der Fachzeitschrift SicherheitsForum, IT-Security, ist zum Thema LOG-Infrastruktur ein ausf\u00fchrlicher Artikel nachzulesen. Noch heute ein <a href=\"https:\/\/sicherheitsforum.hamster.ch\/subscribe\" target=\"_blank\" data-cke-saved-href=\"https:\/\/hamster.ch\/subscribe\" rel=\"noopener\">Probeabo<\/a> bestellen.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>F\u00fcr den Aufbau einer Log-Infrastruktur steht eine kaum \u00fcberschaubare Auswahl an Produkten zur Verf\u00fcgung. Sie alle k\u00f6nnen aber nur die in Logs enthaltenen Daten auswerten und darstellen. Grund genug, einen Schritt zur\u00fcckzugehen und sich Gedanken zu machen, was geloggt werden soll. In der Fachzeitschrift SicherheitsForum, IT-Security, ist zum Thema LOG-Infrastruktur ein ausf\u00fchrlicher Artikel nachzulesen. Noch [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13575,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[62,63],"class_list":["post-14151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-ict-sicherheit","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"LOG-Infrastruktur","_yoast_wpseo_opengraph-image":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/LOG-Infrastruktur-it-security.jpg","_yoast_wpseo_opengraph-description":"Eigentlich \u201eLOGisch\u201c \u2013 was man beim Loggen beachten sollte \u2013 oder?","_yoast_wpseo_opengraph-title":"LOG-Infrastruktur","enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LOG-Infrastruktur - Save<\/title>\n<meta name=\"description\" content=\"Eigentlich \u201eLOGisch\u201c was man beim Loggen beachten sollte, oder? F\u00fcr den Aufbau einer Log-Infrastruktur steht eine enorme Auswahl an Produkten zur Verf\u00fcgung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/de\/log-infrastruktur\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LOG-Infrastruktur\" \/>\n<meta property=\"og:description\" content=\"Eigentlich \u201eLOGisch\u201c \u2013 was man beim Loggen beachten sollte \u2013 oder?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/de\/log-infrastruktur\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-28T10:01:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/LOG-Infrastruktur-it-security.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschrieben von\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"LOG-Infrastruktur\",\"datePublished\":\"2015-10-28T10:01:55+00:00\",\"dateModified\":\"2023-03-14T07:57:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/\"},\"wordCount\":66,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/LOG-Infrastruktur-it-security.jpg\",\"keywords\":[\"ICT-Sicherheit\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/\",\"name\":\"LOG-Infrastruktur - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/LOG-Infrastruktur-it-security.jpg\",\"datePublished\":\"2015-10-28T10:01:55+00:00\",\"dateModified\":\"2023-03-14T07:57:31+00:00\",\"description\":\"Eigentlich \u201eLOGisch\u201c was man beim Loggen beachten sollte, oder? F\u00fcr den Aufbau einer Log-Infrastruktur steht eine enorme Auswahl an Produkten zur Verf\u00fcgung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/LOG-Infrastruktur-it-security.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/LOG-Infrastruktur-it-security.jpg\",\"width\":499,\"height\":329},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/log-infrastruktur\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LOG-Infrastruktur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LOG-Infrastruktur - Save","description":"Eigentlich \u201eLOGisch\u201c was man beim Loggen beachten sollte, oder? F\u00fcr den Aufbau einer Log-Infrastruktur steht eine enorme Auswahl an Produkten zur Verf\u00fcgung.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/de\/log-infrastruktur\/","og_locale":"de_DE","og_type":"article","og_title":"LOG-Infrastruktur","og_description":"Eigentlich \u201eLOGisch\u201c \u2013 was man beim Loggen beachten sollte \u2013 oder?","og_url":"https:\/\/news.save.ch\/de\/log-infrastruktur\/","og_site_name":"Save","article_published_time":"2015-10-28T10:01:55+00:00","article_modified_time":"2023-03-14T07:57:31+00:00","og_image":[{"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/LOG-Infrastruktur-it-security.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Geschrieben von":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/log-infrastruktur\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/log-infrastruktur\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"LOG-Infrastruktur","datePublished":"2015-10-28T10:01:55+00:00","dateModified":"2023-03-14T07:57:31+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/log-infrastruktur\/"},"wordCount":66,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/log-infrastruktur\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/LOG-Infrastruktur-it-security.jpg","keywords":["ICT-Sicherheit","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/log-infrastruktur\/","url":"https:\/\/news.save.ch\/log-infrastruktur\/","name":"LOG-Infrastruktur - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/log-infrastruktur\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/log-infrastruktur\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/LOG-Infrastruktur-it-security.jpg","datePublished":"2015-10-28T10:01:55+00:00","dateModified":"2023-03-14T07:57:31+00:00","description":"Eigentlich \u201eLOGisch\u201c was man beim Loggen beachten sollte, oder? F\u00fcr den Aufbau einer Log-Infrastruktur steht eine enorme Auswahl an Produkten zur Verf\u00fcgung.","breadcrumb":{"@id":"https:\/\/news.save.ch\/log-infrastruktur\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/log-infrastruktur\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/news.save.ch\/log-infrastruktur\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/LOG-Infrastruktur-it-security.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/LOG-Infrastruktur-it-security.jpg","width":499,"height":329},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/log-infrastruktur\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"LOG-Infrastruktur"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Schweizer Fachzeitschrift f\u00fcr Sicherheit","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Sicherheitsforum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"admin","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/de\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/posts\/14151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/comments?post=14151"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/posts\/14151\/revisions"}],"predecessor-version":[{"id":17711,"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/posts\/14151\/revisions\/17711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/media\/13575"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/media?parent=14151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/categories?post=14151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/de\/wp-json\/wp\/v2\/tags?post=14151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}