(By: Gil Raviv. Originally published here)

In this walkthrough we will show step-by-step how to turn web traffic logs (W3C Extended Log File Format) into a powerful security analytics workbook. To watch other episodes of Excel for Security Analysts go here.

Web traffic logs are generated by web proxies and application firewalls to track inbound and outbound traffic and report detection of viruses or unapproved content.

Using Excel 2016, we will import the file, shape it with the Query Editor which is based on Power Query technology, load it to the Data Model and get security insights with PivotTable and DAX formula.

Ready to go?

Continue reading “Excel for Security Analysts – Episode 1”