Table of Contents
In this section, we’ll review different ways that Security Onion can collect logs from endpoints.