In several of our Information Security Briefing sessions, we have heard about the importance of logging for anomaly detection and incident response.
Below is a link to various “cheat sheets” for logging to help you enable and configure system logs.
Please note this is not an endorsement of this vendor; we are posting for information sharing purposes only.