Skip to content
arrow_back
search
E8-AC-ML3.5 bolt ASD Essential Eight

Workstation event logs are promptly analysed for security events

Quickly check workstation logs to find any security events.

record_voice_over

Plain language

Event logs are like a diary for your computers, recording everything that happens on them. By checking these logs quickly, we can spot any suspicious activity, like someone trying to break in. If we don't keep an eye on these logs, bad guys could sneak in and cause damage without anyone noticing.

Framework

ASD Essential Eight

Control effect

Detective

E8 mitigation strategy

Application control

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML3

Official control statement

Event logs from workstations are analysed in a timely manner to detect cyber security events.
bolt ASD Essential Eight E8-AC-ML3.5
priority_high

Why it matters

Neglecting timely workstation log analysis can leave breaches undetected, enabling persistence, lateral movement and privilege escalation.

settings

Operational notes

Centralise workstation event logs (e.g., to SIEM), alert on key events and review/triage within 24 hours with defined escalation.

Mapping detail

Mapping

Direction

Controls