Logging tools to help identify and respond to network attacks, suspicious behavior and policy violations.