Collecting the logs in their entirety despite the large volumes.
To guarantee a correlation and integrity between the various collected data.
To succeed in classifying and archiving the logs so that they can be processed later.
Contextualize the logs, through the source IP, the requested functionality, and the reason for the refusal.
Provide an additional layer of security to your network infrastructure, thus reducing its vulnerability.