Security Log and Event Monitoring Checklist
Use this checklist to document the review and monitoring of security logs and events for your systems.
Reviewer Name
*
First Name
Last Name
Date of Review
*
-
Month
-
Day
Year
Date
Hour Minutes
AM
PM
AM/PM Option
Department or Team
*
System or Application Monitored
*
Types of Logs Reviewed
*
Access Logs
Error Logs
Audit Logs
System Events
Network Logs
Application Logs
Other
Monitoring Methods Used
*
Automated Monitoring Tools
Manual Review
Real-Time Alerts
Scheduled Reports
Other
Were any suspicious or unauthorized activities detected?
*
Yes
No
If yes, please describe the suspicious or unauthorized activities detected.
Actions Taken (if any)
Follow-up Required?
*
Yes
No
Additional Comments or Observations
Submit Checklist
Should be Empty: