Enabling log hashing
Enable log hashing to have any system that writes event and flow data creates hash files. Use these hash files to verify that the event and flow logs were not modified since they were originally written to disk. The hash files are generated in memory before the files are written to disk, so the event and flow logs cannot be tampered with before the hash files are generated.
About this task
The system uses the following hashing algorithm types:
- Message-Digest Hash Algorithm
- Transforms digital signatures into shorter values called Message-Digests (MD).
- Secure Hash Algorithm (SHA) Hash Algorithm
- Standard algorithm that creates a larger (60 bit) MD.