| 
					
				 | 
			
			
				@@ -200,7 +200,7 @@ Logs are usually the first place to look for evidence 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 of security breaches, but they are useless if they can be tampered with. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 A good solution is to set up centralized logging with a dedicated logging 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-server. Acess to it should be restricted. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+server. Access to it should be restricted. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 In addition to having all of the logs in a single place, if configured 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 correctly, it can make it harder for intruders to tamper with your logs. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 |