Certify Web ContentCertify Web ContentCertify Web Content
Bologna, Italy
(from 8 to 22)
Certify Web ContentCertify Web ContentCertify Web Content

Server Logs Certification

Certify exported web, CDN/WAF, firewall and app logs to document attacks and abusive traffic (EU-qualified timestamp by default; international on request)

Server Logs Certification

If your website or infrastructure suffered attacks, abusive traffic or account misuse, we can certify server and platform logs with full legal value.

We work with exported logs from your online platforms and providers (we do not image your devices): web servers (Apache, Nginx, IIS), reverse proxies, CDN/WAF dashboards (Cloudflare, Akamai, AWS CloudFront/WAF), hosting panels (cPanel, Plesk), firewalls and security gateways, application logs, auth/login logs (SSH/FTP/admin), SIEM/ELK/Splunk exports and database audit logs.

We perform a forensic acquisition of the exported artifacts (.log, .txt, .csv, .json, .ndjson, .gz/.zip), preserving URLs, visible data and technical metadata (timestamps, IPs, user-agents, referrers, request paths, status codes). We then issue a Certified Copy with digital signature and qualified EU timestamp. By default the certification is valid across the European Union; on request we can apply an international timestamp suitable for recognition worldwide.

When private portals must be accessed, we operate under a digital legal mandate signed by the client (read-only whenever possible). All procedures are GDPR-compliant and handled with strict confidentiality.

Optional incident response: upon request we can extend the activity to identify the responsible parties of a WordPress attack (attribution-oriented enrichment of IPs/ASNs, patterns, IOCs) and perform site recovery and hardening. See the dedicated service “Identificazione dei Responsabili dell’Attacco a WordPress e Ripristino”.

  • Forensic capture of web/CDN/WAF logs, firewall events, application/auth logs and SIEM exports
  • Documentation of attack patterns (brute-force, L7 floods, SQLi, path traversal, scanner/bot swarms, endpoint abuse)
  • Correlation, time-zone/NTP alignment, optional WHOIS/ASN/GeoIP enrichment and IOC list
  • Certified Copy with digital signature + qualified EU timestamp (international on request)
  • Optional: capture video, SHA-256 hash attestation, structured annexes and incident timeline

Act fast: providers routinely rotate or purge logs and dashboards. Enable exports (CSV/JSON) and download originals as soon as possible to avoid losing decisive evidence.

Request a Free Estimate

Why is it important to certify server logs?

1) Evidence evaporates: hosting providers, CDNs and WAFs routinely rotate logs; dashboards may only show aggregates. Without prompt forensic certification, crucial IPs, user-agents and request sequences are lost.

2) Screenshots are not enough: they can be manipulated and lack integrity guarantees. A Certified Copy with a qualified timestamp preserves what was recorded, where and when, with integrity and authenticity for court use.

Our Server Logs Certification builds a tamper-evident evidentiary package suited for complaints, insurance claims, platform disputes and negotiations.

Click to access the login or register cheese