Systematic approach to analyzing logs during incident investigation.
Framework for effective log analysis to support incident response and threat hunting activities.
Gather relevant logs for analysis.
Create initial timeline.
Analyze logs systematically.
Look for attack patterns.
Document analysis results.