Allan says: Logs and log correlation are not new concepts in information security, and yet information derived from conventional logs is generally under utilized. Here are a few simple techniques that will help you not only get a better sense of your current security posture, but also show you some of the resources, capabilities, and motivation of your attackers.... at no extra cost but your time. You never know what you will find when you start mining your own data. Also, messing with your attackers is FUN!