Understanding Event Logs Is Critical To Cyber Security