Logs are generated with such detail that you can monitor the actual data an individual is trafficking it across. This also helps in tracking various new ways of attacks, since we can monitor how a hacker is trying to crack into the system. Logging would also prove more useful to trace the amount of bandwidth being used by an individual resource, the sites that are being accessed, and which resource is being utilized most often.