System logs describe what the operating system and core services are doing. Use them to confirm reboots, service restarts, update activity, and signs of instability such as disk, memory, or driver errors.
Authentication and audit logs describe who accessed what and what privileged actions were taken. Use them to investigate logins, failed attempts, privilege elevation, account changes, and security relevant configuration changes.
Application logs describe what a specific application is doing. Use them to trace user actions, API calls, validation failures, and business events, and to connect an incident to an app feature or transaction.
Network logs describe connectivity and policy decisions. Use them to understand who talked to what, through which ports, and whether traffic was allowed, denied, redirected, or resolved through DNS.