Although some host-based intrusion detection techniques be expecting the log files to be gathered and managed by a separate log server, Other individuals have their particular log file consolidators designed-in and likewise Acquire other information and facts, such as network traffic packet captures.ManageEngine is a leading producer of IT network