Your network has plenty to say about your organization's threat posture. These three tips will help you get the most out of security log management tools.