<s>
Log	B-Application
management	I-Application
(	O
LM	O
)	O
comprises	O
an	O
approach	O
to	O
dealing	O
with	O
large	O
volumes	O
of	O
computer-generated	O
log	O
messages	O
(	O
also	O
known	O
as	O
audit	O
records	O
,	O
audit	O
trails	O
,	O
event-logs	O
,	O
etc	O
.	O
</s>
<s>
Log	B-Application
management	I-Application
generally	O
covers	O
:	O
</s>
<s>
The	O
primary	O
drivers	O
for	O
log	B-Application
management	I-Application
implementations	O
are	O
concerns	O
about	O
security	O
,	O
system	B-Application
and	O
network	O
operations	O
(	O
such	O
as	O
system	B-Application
or	O
network	O
administration	O
)	O
and	O
regulatory	O
compliance	O
.	O
</s>
<s>
Logs	O
are	O
generated	O
by	O
nearly	O
every	O
computing	O
device	O
,	O
and	O
can	O
often	O
be	O
directed	O
to	O
different	O
locations	O
both	O
on	O
a	O
local	O
file	B-Application
system	I-Application
or	O
remote	O
system	B-Application
.	O
</s>
<s>
Users	O
and	O
potential	O
users	O
of	O
log	B-Application
management	I-Application
may	O
purchase	O
complete	O
commercial	O
tools	O
or	O
build	O
their	O
own	O
log-management	O
and	O
intelligence	O
tools	O
,	O
assembling	O
the	O
functionality	O
from	O
various	O
open-source	B-License
components	O
,	O
or	O
acquire	O
(	O
sub	O
-	O
)	O
systems	O
from	O
commercial	O
vendors	O
.	O
</s>
<s>
Log	B-Application
management	I-Application
is	O
a	O
complicated	O
process	O
and	O
organizations	O
often	O
make	O
mistakes	O
while	O
approaching	O
it	O
.	O
</s>
