{"id":203,"date":"2021-04-30T13:13:38","date_gmt":"2021-04-30T04:13:38","guid":{"rendered":"http:\/\/signature-sushi.com\/wp_sunny\/?page_id=203"},"modified":"2021-06-21T02:11:19","modified_gmt":"2021-06-21T02:11:19","slug":"mylogstar","status":"publish","type":"page","link":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/mylogstar\/","title":{"rendered":"PC\u64cd\u4f5c\u30ed\u30b0\u7ba1\u7406\u30bd\u30d5\u30c8"},"content":{"rendered":"<h2>PC Operation Log Management Software<\/h2>\r\n\r\n\r\n\r\n<p>MylogStar<sup>TM<\/sup> is a software for collecting and managing PC operation logs.<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns alignfull\">\r\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\r\n<div class=\"wp-block-columns alignwide\">\r\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\r\n<div class=\"wp-block-cover has-background-dim-30 has-background-dim\" style=\"min-height:200px\"><img loading=\"lazy\" width=\"1024\" height=\"683\" class=\"wp-block-cover__image-background wp-image-215\" alt=\"\" src=\"http:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/work-731198_1920-1024x683.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/work-731198_1920-1024x683.jpg 1024w, https:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/work-731198_1920-300x200.jpg 300w, https:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/work-731198_1920-768x512.jpg 768w, https:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/work-731198_1920-1536x1024.jpg 1536w, https:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/work-731198_1920-1200x800.jpg 1200w, https:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/work-731198_1920.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container\">\r\n<p class=\"has-text-align-center has-nv-site-bg-color has-text-color has-large-font-size\"><\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large\"><img src=\"blob:http:\/\/signature-sushi.com\/29025565-dd6c-43e2-b428-52f24809fcb3\" alt=\"\"\/><\/figure>\r\n\r\n\r\n\r\n<h2 class=\"has-text-align-center has-nv-c-2-color has-text-color\"><span class=\"has-inline-color has-nv-c-1-color\">What is a log?<\/span><\/h2>\r\n\r\n\r\n\r\n<p>\r\nLog file is the what obtaining a record of information and history of a computer&#8217;s usage and data communication.\r\nFor example, when you use a computer, information such as what files you open and what software you use is recorded on the computer. \r\nAlso, when you visit a website using the Internet, a record is kept of which page you visited on what date and month.\r\nIn addition, special systems can be used to collect more detailed information. \r\n<strong>The computer usage history collected in this way is called a &#8220;log&#8221;.<\/strong> \r\nLogs contain a great deal of information, and if examined in detail, they can tell us <strong>who was working on the computer, when they were working, and what kind of work they were doing.<\/strong>\r\n\r\n<\/p>\r\n\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\"\/>\r\n\r\n\r\n\r\n<h2 class=\"has-text-align-center has-nv-c-2-color has-text-color\"><span class=\"has-inline-color has-nv-c-1-color\">Why do we need log management?<\/span><\/h2>\r\n\r\n\r\n\r\n<p>\r\n\r\nIn an environment where many users use computers, such as in a company or school, the volume of logs can be enormous.\r\nFor example, if you want to find out if a certain user used a certain file on a certain date and time, it would be very time-consuming to go through all the logs. This is where log management software can help.\r\nBy examining the logs, you can find out exactly<strong> who did what, when, and what kind of work, which can help you prevent unauthorized usage and identify the cause of problems when they occur.<\/strong>\r\n\r\n<\/p>\r\n\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\"\/>\r\n\r\n\r\n\r\n<h2 class=\"has-text-align-center has-nv-c-2-color has-text-color\"><span class=\"has-inline-color has-nv-c-1-color\">What can we do by log management?<\/span><\/h2>\r\n\r\n\r\n\r\n<p>Log management software enables you to collect more detailed information and history in addition to the standard log collection that comes with your computer. It also analyzes the collected data and displays reports in a way that is easy for administrators to understand. In addition, as auxiliary functions, it provides various functions that administrators need, such as monitoring function to monitor logs in real time, compression of collected logs, and a function to prevent unauthorized tampering with logs.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-gallery aligncenter columns-6\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"128\" height=\"128\" src=\"http:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/\u66f8\u985e\u30d5\u30a1\u30a4\u30eb\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8.png\" alt=\"\" data-id=\"236\" data-link=\"http:\/\/signature-sushi.com\/wp_sunny\/?attachment_id=236\" class=\"wp-image-236\"\/><figcaption class=\"blocks-gallery-item__caption\"><strong>\u30ed\u30b0\u53ce\u96c6<\/strong><\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"128\" height=\"128\" src=\"http:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/\u6298\u308c\u7dda\u3068\u68d2\u30b0\u30e9\u30d5\u306e\u30a2\u30a4\u30b3\u30f3\u7d20\u6750.png\" alt=\"\" data-id=\"235\" data-link=\"http:\/\/signature-sushi.com\/wp_sunny\/?attachment_id=235\" class=\"wp-image-235\"\/><figcaption class=\"blocks-gallery-item__caption\"><strong>\u30ec\u30dd\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"128\" height=\"128\" src=\"http:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/\u66f8\u985e\u691c\u7d22\u30a2\u30a4\u30b3\u30f31.png\" alt=\"\" data-id=\"237\" data-link=\"http:\/\/signature-sushi.com\/wp_sunny\/?attachment_id=237\" class=\"wp-image-237\"\/><figcaption class=\"blocks-gallery-item__caption\"><strong>\u30ed\u30b0\u5206\u6790<\/strong><\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"128\" height=\"128\" src=\"http:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/\u30bb\u30ad\u30e5\u30a2PC.png\" alt=\"\" data-id=\"238\" data-link=\"http:\/\/signature-sushi.com\/wp_sunny\/?attachment_id=238\" class=\"wp-image-238\"\/><figcaption class=\"blocks-gallery-item__caption\"><strong>\u6539\u3056\u3093\u9632\u6b62<\/strong><\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"128\" height=\"128\" src=\"http:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/\u30c7\u30a3\u30b9\u30d7\u30ec\u30a4\u306e\u30a2\u30a4\u30b3\u30f3\u7d20\u6750-3.png\" alt=\"\" data-id=\"239\" data-link=\"http:\/\/signature-sushi.com\/wp_sunny\/?attachment_id=239\" class=\"wp-image-239\"\/><figcaption class=\"blocks-gallery-item__caption\"><strong>\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0<\/strong><\/figcaption><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"128\" height=\"128\" src=\"http:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/\u30d5\u30ea\u30fc\u306e\u5727\u7e2e\u30d5\u30a9\u30eb\u30c0\u30a2\u30a4\u30b3\u30f3.png\" alt=\"\" data-id=\"249\" data-link=\"http:\/\/signature-sushi.com\/wp_sunny\/?attachment_id=249\" class=\"wp-image-249\"\/><figcaption class=\"blocks-gallery-item__caption\"><strong>\u30d5\u30a1\u30a4\u30eb\u306e\u5727\u7e2e<\/strong><\/figcaption><\/figure><\/li><\/ul><\/figure>\r\n\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\"\/>\r\n\r\n\r\n\r\n<h2 class=\"has-text-align-center has-nv-c-2-color has-text-color\"><span class=\"has-inline-color has-nv-c-1-color\">What effects can we expect?<\/span><\/h2>\r\n\r\n\r\n\r\n<p>\r\nPreventing the leakage of personal information via the Internet or USB memory devices is an issue that companies and organizations should focus on to the fullest extent.\r\n<strong>Thailand&#8217;s first unified privacy law<\/strong>, <strong>the Personal Data Protection Act (PDPA)<\/strong>, has been attracting a lot of attention. \r\nLog management makes it possible to prevent these risks from occurring. \r\nIn addition, even if an information leak should occur, it is possible to quickly determine the cause and prevent the spread of the leak by examining the logs. \r\nBy simply implementing a log management system, the number of users who use their computers for purposes unrelated to their work can be reduced, which will have a deterrent effect on business efficiency and cost reduction.\r\n<\/p>\r\n\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\"\/>\r\n\r\n\r\n\r\n<h2 class=\"has-text-align-center has-nv-c-2-color has-text-color\"><strong><span class=\"has-inline-color has-nv-c-1-color\">Conclusion<\/span><\/strong><\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns\">\r\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\r\n<ul><li><strong>At first, let us sort out the purpose of log management.<\/strong><\/li><li><strong>It is important to know what you can understand by log management.<\/strong><\/li><li><strong>Let us understand what kind of effects can be obtained by log management.<\/strong><\/li><\/ul>\r\n<\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<hr class=\"wp-block-separator is-style-wide\"\/>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns\">\r\n<div class=\"wp-block-column\">\r\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.mylogstar.net\/\"><img loading=\"lazy\" width=\"314\" height=\"154\" src=\"http:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/MyLogStar_Logo.png\" alt=\"\" class=\"wp-image-209\" srcset=\"https:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/MyLogStar_Logo.png 314w, https:\/\/wpsunny2.sunnysystem.co.th\/wp-content\/uploads\/2021\/04\/MyLogStar_Logo-300x147.png 300w\" sizes=\"(max-width: 314px) 100vw, 314px\" \/><\/a><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column is-vertically-aligned-center\">\r\n<h3>&#8220;Collecting and managing client operation logs&#8221; Software\r\n<br>MylogStar<\/h3>\r\n\r\n\r\n\r\n<p><strong>MylogStar is a dedicated client operation log management software that is effective in preventing information leaks, investigating the cause of information leaks, and preventing the spread of information leaks in the event of an information leak. Since its launch in 2008, MylogStar has been highly evaluated for its high log collection capability and has been introduced by many companies and organizations.\u3002<\/strong><\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-buttons\">\r\n<div class=\"wp-block-button is-style-secondary\"><a class=\"wp-block-button__link\" href=\"http:\/\/signature-sushi.com\/wp_sunny\/contact\/\">Contact US<\/a><\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>","protected":false},"excerpt":{"rendered":"<p>PC Operation Log Management Software MylogStarTM is a software for collecting and managing PC operation logs. What is a log? Log file is the what obtaining a record of information and history of a computer&#8217;s usage and data communication. For example, when you use a computer, information such as what files you open and what&hellip;&nbsp;<a href=\"https:\/\/wpsunny2.sunnysystem.co.th\/en\/mylogstar\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">PC\u64cd\u4f5c\u30ed\u30b0\u7ba1\u7406\u30bd\u30d5\u30c8<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"full-width","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"on"},"_links":{"self":[{"href":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/wp-json\/wp\/v2\/pages\/203"}],"collection":[{"href":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/wp-json\/wp\/v2\/comments?post=203"}],"version-history":[{"count":17,"href":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/wp-json\/wp\/v2\/pages\/203\/revisions"}],"predecessor-version":[{"id":1160,"href":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/wp-json\/wp\/v2\/pages\/203\/revisions\/1160"}],"wp:attachment":[{"href":"https:\/\/wpsunny2.sunnysystem.co.th\/en\/wp-json\/wp\/v2\/media?parent=203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}