
{"id":2495,"date":"2013-06-18T00:00:00","date_gmt":"2013-06-18T00:00:00","guid":{"rendered":"http:\/\/otava.test\/a-quick-tech-tutorial-daily-log-review\/"},"modified":"2013-06-18T00:00:00","modified_gmt":"2013-06-18T00:00:00","slug":"a-quick-tech-tutorial-daily-log-review","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/","title":{"rendered":"A Quick Tech Tutorial: Daily Log Review for PCI Compliance"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Daily Log Review\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\" alt=\"\" width=\"173\" height=\"173\" \/>A <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\">daily log review<\/a> can detect patterns of normal use and provide insight into any abnormalities in the system network and servers instead of auditing devices after an event occurs.\u00a0 With consistent monitoring and analysis, data breaches can be pinpointed faster and remediated more effectively.<\/p>\n<p>If you collect, store or process credit cardholder data, you need to meet PCI DSS (Payment Card Industry Data Security Standard) compliance requirement 10.6.<\/p>\n<blockquote><p>PCI requirement 10.6 requires log review:<br \/>\nReview logs for all system components at least daily. Log reviews must include those servers that perform security functions like intrusion-detection system (IDS) and authentication, authorization, and accounting protocol (AAA) servers (for example, RADIUS).<\/p><\/blockquote>\n<p>The PCI DSS requirement goes beyond automated logging.\u00a0 You or your provider must actually review and analyze the logs daily.<\/p>\n<p><em><strong>Q<\/strong>:\u00a0 What is daily log review?<\/em><br \/>\n<strong>A<\/strong>:\u00a0 Daily log review is a PCI compliant security standard that says we are going to review your logs on a daily basis for malicious behavior and other anomalies.\u00a0 Actual humans and software will be used to review your logs.\u00a0 Online Tech collects all of the log data on the network and server devices.\u00a0 We keep that online for 90 days and keep archives of that data for a full year, as required by the PCI requirement 10:7:<\/p>\n<blockquote><p>PCI Requirement 10:7<br \/>\nRetain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from back-up).<\/p><\/blockquote>\n<p>Daily log review is more than just an automated process.\u00a0 An actual human being sits down and looks at what is in the log file, reviews it and makes decisions to protect your data.<\/p>\n<p><em><strong>Q<\/strong>: Who should be using daily log review?<\/em><br \/>\n<strong>A<\/strong>:\u00a0 Anyone who is concerned with security and needs to be <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI compliant<\/a>.\u00a0 That could be credit card data, financial data, social security numbers, health care records; anyone with sensitive information needs daily log review.<\/p>\n<blockquote><p>PCI requirement 10.3 mandates that you must:<br \/>\nRecord at least the following audit trail entries for all system components for each event &#8211; a whole list of events follow, including user ID, type of event, data and time, success or failure indication, etc.<\/p><\/blockquote>\n<p><strong>Q<\/strong>: How does it work?<br \/>\n<strong>A<\/strong>: Online Tech configures your devices to send messages to our daily log review system.\u00a0 Reports of daily log reviews are availably monthly in OTPortal. We keep 90 days of instant access logs and up to a year of archived messages.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Daily Log Review\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/dailylogreview.png\" alt=\"Daily Log Review\" width=\"543\" height=\"394\" \/><\/p>\n<p>To learn more about Daily Log Review and <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI hosting<\/a>, download <a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\">Online Tech\u2019s PCI Compliant Hosting<\/a> whitepaper.\u00a0 It explores the impact of the PCI DSS standard on data centers and server infrastructure, describes the architecture of a <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/pci-compliant-data-centers\">PCI compliant data center<\/a> both technically and contractually, and outlines the benefits and risks of data center outsourcing and vendor selection criteria.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network and servers instead of auditing devices after an event occurs.\u00a0 With consistent monitoring and analysis, data breaches can be pinpointed faster and remediated more effectively. If you collect, store or process credit cardholder data, you need to meet PCI DSS (Payment Card Industry Data Security Standard) compliance requirement 10.6. PCI requirement 10.6 requires log review: Review logs for all system components at least daily. Log reviews must include those servers that perform security functions like intrusion-detection system (IDS) and authentication, authorization, and accounting protocol (AAA) servers (for example, RADIUS). The PCI DSS requirement goes beyond automated logging.\u00a0 You or your provider must actually review and analyze the logs daily. Q:\u00a0 What is daily log review? A:\u00a0 Daily log review is a PCI compliant security standard that says we are going to review your logs on a daily basis for malicious behavior and other anomalies.\u00a0 Actual humans and software will be used to review your logs.\u00a0 Online Tech collects all of the log data on the network and server devices.\u00a0 We keep that online for 90 days and keep archives of&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2495","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Quick Tech Tutorial: Daily Log Review for PCI Compliance | OTAVA<\/title>\n<meta name=\"description\" content=\"A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network and servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Quick Tech Tutorial: Daily Log Review for PCI Compliance\" \/>\n<meta property=\"og:description\" content=\"A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network and servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"A Quick Tech Tutorial: Daily Log Review for PCI Compliance\",\"datePublished\":\"2013-06-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/\"},\"wordCount\":472,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/\",\"url\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/\",\"name\":\"A Quick Tech Tutorial: Daily Log Review for PCI Compliance | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\",\"datePublished\":\"2013-06-18T00:00:00+00:00\",\"description\":\"A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network and servers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Quick Tech Tutorial: Daily Log Review for PCI Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Quick Tech Tutorial: Daily Log Review for PCI Compliance | OTAVA","description":"A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network and servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/","og_locale":"en_US","og_type":"article","og_title":"A Quick Tech Tutorial: Daily Log Review for PCI Compliance","og_description":"A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network and servers.","og_url":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/","og_site_name":"OTAVA","article_published_time":"2013-06-18T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"A Quick Tech Tutorial: Daily Log Review for PCI Compliance","datePublished":"2013-06-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/"},"wordCount":472,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/","url":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/","name":"A Quick Tech Tutorial: Daily Log Review for PCI Compliance | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png","datePublished":"2013-06-18T00:00:00+00:00","description":"A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network and servers.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/a-quick-tech-tutorial-daily-log-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"A Quick Tech Tutorial: Daily Log Review for PCI Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2495"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2495\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2495"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}