Skip to content
arrow_back
search
E8-RA-ML3.9 bolt ASD Essential Eight

Timely analysis of workstation event logs for security events

Regularly check logs on office computers to find security issues early.

record_voice_over

Plain language

Checking the event logs on your office computers regularly helps catch security problems early, like someone trying to hack in or mess with your systems. If you don’t keep an eye on these logs, a cybercriminal could sneak in, and you might not know until they’ve stolen sensitive information or disrupted operations.

Framework

ASD Essential Eight

Control effect

Detective

E8 mitigation strategy

Restrict administrative privileges

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML3

Official control statement

Event logs from workstations are analysed in a timely manner to detect cyber security events.
bolt ASD Essential Eight E8-RA-ML3.9
priority_high

Why it matters

Neglecting timely log analysis allows attackers to escalate privileges undetected, leading to potential data breaches or operational disruption.

settings

Operational notes

Review workstation event logs daily and triage alerts to spot suspicious sign-ins, privilege changes and malware activity early.

Mapping detail

Mapping

Direction

Controls