Skip to main content
Squid
Usage
Configurations
Security
FAQs
Product
ReleaseNotes
Buy
Support
1.1.0
Search
Auditing & Logging
On this page
Loading content…
Previous
Security Architecture
Next
Security Best Practices
Logging Framework Overview
Log Levels
Configuring Log Level
Security Logging Recommendations
Security-Relevant Log Events
Authentication Events
Authorization Events
Query Validation Events
Data Access Events
Response Metadata
Key Audit Fields
Debug Flags
Audit Use Cases
Use Case 1: Investigating Unauthorized Access Attempt
Use Case 2: Data Exfiltration Detection
Use Case 3: Compliance Audit
Use Case 4: Performance Security
Log Retention Recommendations
Integration with SIEM
Log Forwarding
Suggested SIEM Rules
Response Warnings
Warning Types
Creating an Audit Dashboard
Access Metrics
Configuration Metrics
Query Metrics
Anomaly Detection
Related Topics
We track. Ok?
Deny
Consent