This document discusses security information and event management (SIEM) systems. It defines log files and events, and explains that SIEM systems allow organizations to monitor security events and write correlation rules to detect patterns of attacks. The document outlines typical SIEM architectures and notes that SIEM systems present detailed information about attack scenarios by correlating disparate security-related events from various sources.