Although some host-primarily based intrusion detection methods be expecting the log documents to become gathered and managed by a separate log server, Some others have their own personal log file consolidators crafted-in and likewise Collect other information and facts, including community traffic packet captures.Component of that profile consists